{"id":4980,"date":"2011-08-19T00:00:00","date_gmt":"2011-08-19T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2011\/08\/19\/linux-hardening-quick-wins\/"},"modified":"2021-01-28T16:20:21","modified_gmt":"2021-01-28T16:20:21","slug":"linux-hardening-quick-wins","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/","title":{"rendered":"Linux Hardening &#8211; Quick Wins"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"recent_articles\" class=\"hidden-xs\"><\/div>\n<\/p><\/div>\n<p>The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker &#8212; a custom compiled kernel and the bare minimum of packages needed for the server to do its intended job.<\/p>\n<p>\u00a0<\/p>\n<p>But what if you already have Linux servers running in your business? If that&#8217;s the case then here are some simple steps you can take to improve security that take just a few minutes to implement:<\/p>\n<p><strong>Remove unnecessary software to minimize your attack surface <\/strong>&#8211; The more code your server is running, the more likely it is that a hacker will be able to find a vulnerability to exploit. Go through all the packages installed on your system and remove any that aren&#8217;t necessary.<\/p>\n<p>To list all installed packages: yum list installed or dpkg \u2013l<\/p>\n<p>To remove a package: yum remove somepackage or apt-get remove somepackage<\/p>\n<p><strong>Apply the latest security patches <\/strong>&#8211; Once a vulnerability in any software you&#8217;re running has been discovered, your system is in danger until the vulnerability is patched.<\/p>\n<p>To update your system with all patches that are available: yum update or apt-get update apt-get upgrade<\/p>\n<p>You can automate this process to update daily or weekly using the cron scheduler by placing a suitable script in \/etc\/cron.daily\/ or \/etc\/cron.weekly\/<\/p>\n<p><strong>Avoid logging in as root <\/strong>&#8211; Use the sudo command instead to execute (and log) commands as root when necessary. Make sure that the accounts that need sudo privileges are listed in \/etc\/sudoers, which you can edit with visudo. You can give contractors and other users that may need it accounts with sudo privileges for certain commands, and delete the accounts or remove them from \/etc\/sudoers when they no longer need them.<\/p>\n<p>You can disable root SSH login by opening the sshd_config file: vi \/etc\/ssh\/sshd_config and then edit it by uncommenting or adding a line: PermitRootLogin no<\/p>\n<p>It&#8217;s also sensible to add, edit or uncomment a Protocol line: Protocol 2 to force the use of SSH protocol 2, rather than the less secure Protocol 1.<\/p>\n<p>Restart the sshd service for this to take effect: \/etc\/init.d\/sshd restart<\/p>\n<p><strong>Lock any user accounts which have no passwords <\/strong>-Accounts with no passwords are an unnecessary security risk. To find any accounts which have no password use the passwd command and look for any with the status NP (no password): passwd -Sa | grep NP<\/p>\n<p>You can lock any accounts you find using passwd -l: passwd -l someuser<\/p>\n<p>To unlock an account use: passwd -u<\/p>\n<p><strong>Lock user accounts after three failed login attempts <\/strong>-Restricting the number of login attempts before an account is disabled makes it hard for a hacker to guess a password successfully. You need to strike a balance between security and convenience, but genuine users are unlikely to mistype their password three times in a row.<\/p>\n<p>To lock the account of user someuser after three attempts use the faillog command: faillog -m 3 -u someuser<\/p>\n<p>You can use this command for all users using -a instead of -u someuser. However make sure that the root account can&#8217;t be locked (using -m 0) to prevent being locked out of the root account by a deliberate denial of service attack on the root account.<\/p>\n<p><strong>Disable any services that you don&#8217;t need to run <\/strong>&#8211; To discover what services are configured to start automatically, use the chkconfig command: chkconfig -list<\/p>\n<p>Disable the following services if you don&#8217; specifically need them:<\/p>\n<p>\u00a0<\/p>\n<ul>\n<li>anacron<\/li>\n<li>haldaemon<\/li>\n<li>messagebus<\/li>\n<li>apmd<\/li>\n<li>hidd<\/li>\n<li>microcode_ctl<\/li>\n<li>autofs`<\/li>\n<li>pcscd<\/li>\n<li>avahi-daemon<\/li>\n<li>isdn<\/li>\n<li>readahead_early<\/li>\n<li>bluetooth<\/li>\n<li>kdump<\/li>\n<li>readahead_later<\/li>\n<li>cups<\/li>\n<li>kudzu<\/li>\n<li>firstboot<\/li>\n<li>mcstrans<\/li>\n<li>setroubleshoot<\/li>\n<li>gpm<\/li>\n<li>mdmonitor<\/li>\n<li>xfs<\/li>\n<\/ul>\n<p>To disable a service, use the service and chkconfig commands: service someservice stop chkconfig someservice off<\/p>\n<p>You can use the netstat command to see what services are listening on any open ports: netstat -tulpn<\/p>\n<p>Other measures that take longer or are more complex to implement:<\/p>\n<p><em>Enforce complicated passwords<\/em>: All account passwords should be long (more than eight characters) and made up of lower and upper case letters as well as digits and special characters. This makes them hard for a hacker to brute-force.<\/p>\n<p><em>Disable IPv6<\/em>: Unless you know that you need it, disabling IPv6 is a good idea as it is hard to monitor, making it attractive for hackers, and it&#8217;s also hard to spot security vulnerabilities in the protocol.<\/p>\n<p><em>Disable X Windows<\/em>: Your server probably doesn&#8217;t need a Windowing system installed. If not consider removing it completely.<\/p>\n<p><em>Encrypt all confidential information<\/em>: Consider encrypting both your stored data and data transmitted over the network, using tools like <a href=\"http:\/\/www.go2linux.org\/scp-linux-command-line-copy-files-over-ssh\">scp<\/a>, <a href=\"http:\/\/www.linux.com\/learn\/tutorials\/442424-transfer-files-securely-with-sftp\">sftp<\/a>, <a href=\"http:\/\/www.gnupg.org\/\">GnuPG<\/a> and <a href=\"http:\/\/openvpn.net\/\">OpenVPN<\/a>.<\/p>\n<p><em>Harden your kernel<\/em>: Use a tool like <a href=\"http:\/\/grsecurity.net\/\">grsecurity<\/a> to provide additional security hardening to your system.<\/p>\n<p><em>Protect your server against physical attacks<\/em>: Configure your system so that it is only bootable from an internal hard drive to prevent an intruder starting your system from removable media. The BIOS and boot loader should then be protected with a strong password.<\/p>\n<p>That&#8217;s it for now. Happy hunting.<\/p>\n<p><em>Paul Rubens has been covering IT security for over 20 years. In that time he has written for leading UK and international publications including The Economist, The Times, Financial Times, the BBC, Computing and ServerWatch.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6ea0ab9895-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ea0ab9895\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ea0ab9895\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ea0ab9895\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ea0ab9895\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ea0ab9895\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ea0ab9895\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker &#8212; a custom compiled kernel and the bare minimum of packages needed for the server to do its intended job. \u00a0 But what if you [&hellip;]<\/p>\n","protected":false},"author":226,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[730],"b2b_audience":[],"b2b_industry":[],"b2b_product":[384,401,393,396],"class_list":["post-4980","post","type-post","status-publish","format-standard","hentry","category-products","tag-security","b2b_product-identity-management-privacy","b2b_product-operating-system-security","b2b_product-virtual-private-network-vpn","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux Hardening - Quick Wins | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"While Linux is safe from most malware there are still some things you&#039;ll want to do to make your install bullet proof.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux Hardening - Quick Wins | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"While Linux is safe from most malware there are still some things you&#039;ll want to do to make your install bullet proof.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:20:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Rubens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Rubens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\"},\"author\":{\"name\":\"Paul Rubens\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c\"},\"headline\":\"Linux Hardening &#8211; Quick Wins\",\"datePublished\":\"2011-08-19T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:20:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\"},\"wordCount\":885,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"security\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\",\"name\":\"Linux Hardening - Quick Wins | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2011-08-19T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:20:21+00:00\",\"description\":\"While Linux is safe from most malware there are still some things you'll want to do to make your install bullet proof.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux Hardening &#8211; Quick Wins\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c\",\"name\":\"Paul Rubens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg\",\"caption\":\"Paul Rubens\"},\"description\":\"Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-rubens-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux Hardening - Quick Wins | eSecurity Planet","description":"While Linux is safe from most malware there are still some things you'll want to do to make your install bullet proof.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/","og_locale":"en_US","og_type":"article","og_title":"Linux Hardening - Quick Wins | eSecurity Planet","og_description":"While Linux is safe from most malware there are still some things you'll want to do to make your install bullet proof.","og_url":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/","og_site_name":"eSecurity Planet","article_published_time":"2011-08-19T00:00:00+00:00","article_modified_time":"2021-01-28T16:20:21+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Paul Rubens","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Rubens","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/"},"author":{"name":"Paul Rubens","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c"},"headline":"Linux Hardening &#8211; Quick Wins","datePublished":"2011-08-19T00:00:00+00:00","dateModified":"2021-01-28T16:20:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/"},"wordCount":885,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["security"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/","url":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/","name":"Linux Hardening - Quick Wins | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2011-08-19T00:00:00+00:00","dateModified":"2021-01-28T16:20:21+00:00","description":"While Linux is safe from most malware there are still some things you'll want to do to make your install bullet proof.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/linux-hardening-quick-wins\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Linux Hardening &#8211; Quick Wins"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c","name":"Paul Rubens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg","caption":"Paul Rubens"},"description":"Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.","url":"https:\/\/www.esecurityplanet.com\/author\/paul-rubens-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4980"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4980"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4980\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4980"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4980"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4980"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}