SlideShare una empresa de Scribd logo
1 de 14
10 Ways to Secure your Linux System

Convergence IT Services Pvt. Ltd
10 Ways to Secure your Linux System
Linux is considered one of the most stable and highly secure
open-source OS platforms. Though there is no reason to doubt
this claim but at times hackers have brought Linux to its knees
through vulnerability which was left unattended by the system
admin. Though there is no reason to press the panic button
but it is always a good thing to know few security tips to
manage your Linux in a much more professional and secure
way. By doing this you can really harness the true potential of
this highly useful and flexible OS.

support.convergenceservices.in

2
1. Physical System Security
This is basic yet so many system admin fail to ensure this level
of security. In the physical system security you can configure
the BIOS along with that disable booting from CD/DVD,
External Devices, Floppy Drive in BIOS. You can also enable
BIOS Password and protect GRUB with password so as to
restrict physical access to your Linux system.

support.convergenceservices.in

3
2. Use Secure Shell (SSH)
Secure Shell (SSH) is a protocol which provides a secure
remote access. Protocols like Telnet and rlogin uses simple
text which is not encrypted and can cause security breach. On
the other hand SSH is a secure and encrypted protocol which
can be used for communication with server. Never use default
SSH 22 port number rather use higher level port number.

support.convergenceservices.in

4
3. Disk Partitions
If you want to have higher data security it is imperative you
make different partition of your disk. By doing this you will
separate and group data thereby reducing the damage in case
disaster strikes. You need to make sure that you must have
separate partitions and that third party applications should be
installed on separate file systems under/opt.

support.convergenceservices.in

5
4. Check Listening Network Ports
Use ‘netstat‘ networking command to view all open ports and
associated programs. The ports which are unused should be
disabled using the ‘chkconfig’ command. This simple
precaution can help system admin to make the Linux Server
System.

support.convergenceservices.in

6
5. Disable USB stick to Detect
If you ever want to restrict users from using any kind of USB
stick in your Linux system so that your data is secure from
unauthorized access then you can create a file
‘/etc/modprobe.d/no-usb‘ and adding a line ‘install usbstorage /bin/true’ will not detect USB storage.

support.convergenceservices.in

7
6. Turn on SELinux
• SELinux or Security-Enhanced Linux is an important access
control security mechanism provided in the kernel. So if you
want to add an extra layer of security then it is a good idea to
keep it on.
• SELinux offers three basic modes of operation and they are.
• Enforcing: This is default mode which enables and enforces
the SELinux security policy on the machine.
• Permissive: In this mode, SELinux will not enforce the security
policy on the system, only warn and log actions. This mode
comes handy when you are troubleshooting SELinux related
issues.
• Disabled: SELinux is turned off.
support.convergenceservices.in

8
7. Enforcing stronger password
This looks simple but when implemented can bring some
positive results. A large number of users use weak passwords
and this might give a easy access to hackers to make the guess
work and hack the system with a dictionary based or bruteforce attacks. The ‘pam_cracklib‘ module is available in
Pluggable Authentication Modules)module stack which will
force user to set strong passwords.

support.convergenceservices.in

9
8. Checking account for empty password
When an account is having an empty password it means it is
opened for unauthorized access, for anyone on the web and
it’s a part of security within a Linux server. So it is imperative
for all accounts to have a strong and robust password. Empty
password accounts can be easily hacked and is a security risk.
# cat /etc/shadow| awk -F: '($2==""){print $1}' this command
will check if there is any account with empty.

support.convergenceservices.in

10
9. Disable or Remove unwanted services
It is highly advised to uninstall unwanted and useless software
packages to minimize the risk of vulnerability with your Linux
system. Using ‘chkconfig‘ command you can find out services
which are running on run level 3.

support.convergenceservices.in

11
10. Monitor User Activities
This is a thumb rule to maintain the security of your Linux
system yet many a time system admin fail to follow this simple
rule. If you have plenty of users, then it’s imperative to collect
the data of each user activities and analyze them on the basis
of performance and security issues. We even have a tools
called ‘psacct‘ and ‘acct‘ for monitoring user activities these
tools runs in a system background and constantly tracks each
user activity on a system and resources consumed by services
such as Apache, MySQL, SSH, FTP, etc.

support.convergenceservices.in

12
About us
Convergence Support Desk is a professional website
maintenance service provider. If you have your website
developed in Joomla, Wordpress or Drupal CMS and are
looking to maintain it then please get in touch with us @ +91
22 2513 6632 or
Visit support.convergenceservices.in

support.convergenceservices.in

13
10 Ways to Secure your Linux System

Más contenido relacionado

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Destacado

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Destacado (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

10 Ways to Secure your Linux System

  • 1. 10 Ways to Secure your Linux System Convergence IT Services Pvt. Ltd
  • 2. 10 Ways to Secure your Linux System Linux is considered one of the most stable and highly secure open-source OS platforms. Though there is no reason to doubt this claim but at times hackers have brought Linux to its knees through vulnerability which was left unattended by the system admin. Though there is no reason to press the panic button but it is always a good thing to know few security tips to manage your Linux in a much more professional and secure way. By doing this you can really harness the true potential of this highly useful and flexible OS. support.convergenceservices.in 2
  • 3. 1. Physical System Security This is basic yet so many system admin fail to ensure this level of security. In the physical system security you can configure the BIOS along with that disable booting from CD/DVD, External Devices, Floppy Drive in BIOS. You can also enable BIOS Password and protect GRUB with password so as to restrict physical access to your Linux system. support.convergenceservices.in 3
  • 4. 2. Use Secure Shell (SSH) Secure Shell (SSH) is a protocol which provides a secure remote access. Protocols like Telnet and rlogin uses simple text which is not encrypted and can cause security breach. On the other hand SSH is a secure and encrypted protocol which can be used for communication with server. Never use default SSH 22 port number rather use higher level port number. support.convergenceservices.in 4
  • 5. 3. Disk Partitions If you want to have higher data security it is imperative you make different partition of your disk. By doing this you will separate and group data thereby reducing the damage in case disaster strikes. You need to make sure that you must have separate partitions and that third party applications should be installed on separate file systems under/opt. support.convergenceservices.in 5
  • 6. 4. Check Listening Network Ports Use ‘netstat‘ networking command to view all open ports and associated programs. The ports which are unused should be disabled using the ‘chkconfig’ command. This simple precaution can help system admin to make the Linux Server System. support.convergenceservices.in 6
  • 7. 5. Disable USB stick to Detect If you ever want to restrict users from using any kind of USB stick in your Linux system so that your data is secure from unauthorized access then you can create a file ‘/etc/modprobe.d/no-usb‘ and adding a line ‘install usbstorage /bin/true’ will not detect USB storage. support.convergenceservices.in 7
  • 8. 6. Turn on SELinux • SELinux or Security-Enhanced Linux is an important access control security mechanism provided in the kernel. So if you want to add an extra layer of security then it is a good idea to keep it on. • SELinux offers three basic modes of operation and they are. • Enforcing: This is default mode which enables and enforces the SELinux security policy on the machine. • Permissive: In this mode, SELinux will not enforce the security policy on the system, only warn and log actions. This mode comes handy when you are troubleshooting SELinux related issues. • Disabled: SELinux is turned off. support.convergenceservices.in 8
  • 9. 7. Enforcing stronger password This looks simple but when implemented can bring some positive results. A large number of users use weak passwords and this might give a easy access to hackers to make the guess work and hack the system with a dictionary based or bruteforce attacks. The ‘pam_cracklib‘ module is available in Pluggable Authentication Modules)module stack which will force user to set strong passwords. support.convergenceservices.in 9
  • 10. 8. Checking account for empty password When an account is having an empty password it means it is opened for unauthorized access, for anyone on the web and it’s a part of security within a Linux server. So it is imperative for all accounts to have a strong and robust password. Empty password accounts can be easily hacked and is a security risk. # cat /etc/shadow| awk -F: '($2==""){print $1}' this command will check if there is any account with empty. support.convergenceservices.in 10
  • 11. 9. Disable or Remove unwanted services It is highly advised to uninstall unwanted and useless software packages to minimize the risk of vulnerability with your Linux system. Using ‘chkconfig‘ command you can find out services which are running on run level 3. support.convergenceservices.in 11
  • 12. 10. Monitor User Activities This is a thumb rule to maintain the security of your Linux system yet many a time system admin fail to follow this simple rule. If you have plenty of users, then it’s imperative to collect the data of each user activities and analyze them on the basis of performance and security issues. We even have a tools called ‘psacct‘ and ‘acct‘ for monitoring user activities these tools runs in a system background and constantly tracks each user activity on a system and resources consumed by services such as Apache, MySQL, SSH, FTP, etc. support.convergenceservices.in 12
  • 13. About us Convergence Support Desk is a professional website maintenance service provider. If you have your website developed in Joomla, Wordpress or Drupal CMS and are looking to maintain it then please get in touch with us @ +91 22 2513 6632 or Visit support.convergenceservices.in support.convergenceservices.in 13