modified on 10 November 2016 at 22:10 ••• 16,914 views

ServerSafety

From Maties Ubuntu

(Difference between revisions)
Jump to: navigation, search
m
m
Line 12: Line 12:
 
* harden-doc
 
* harden-doc
 
* bastille
 
* bastille
 +
;Automatic Security Updates
 +
Install software:
 +
sudo apt-get install unattended-upgrades
 +
Enable unattended updates
 +
sudo dpkg-reconfigure -plow unattended-upgrades
 +
Configure unattended updates
 +
sudo nano /etc/apt/apt.conf.d/20auto-upgrades
 +
Add the following;
 +
APT::Periodic::Unattended-Upgrade "1";
 +
Then configure the following:
 +
sudo nano /etc/apt/apt.conf.d/50unattended-upgrades
 +
See links below for reference:
 +
*https://help.ubuntu.com/community/AutomaticSecurityUpdates
 +
*https://help.ubuntu.com/lts/serverguide/automatic-updates.html
 
;Help Links
 
;Help Links
 
*https://www.thefanclub.co.za/how-to/how-secure-ubuntu-1204-lts-server-part-1-basics
 
*https://www.thefanclub.co.za/how-to/how-secure-ubuntu-1204-lts-server-part-1-basics

Revision as of 10:07, 24 June 2015

Back to Security

Ubuntu uses the Debian philosophy of denying services and being most restrictive when a first time install or configuration is done. It is up to the user to open up services or relax restrictions.

Hardening Ubuntu for server use

Install the following packages:

  • harden
  • harden-tools
  • harden-doc
  • bastille
Automatic Security Updates

Install software:

sudo apt-get install unattended-upgrades

Enable unattended updates

sudo dpkg-reconfigure -plow unattended-upgrades

Configure unattended updates

sudo nano /etc/apt/apt.conf.d/20auto-upgrades

Add the following;

APT::Periodic::Unattended-Upgrade "1";

Then configure the following:

sudo nano /etc/apt/apt.conf.d/50unattended-upgrades

See links below for reference:

Help Links
Penetration Testing and Forensic Analysis