Security Checklist
Dec 18, 2024 4 min
1. Update the System
- How:
- For Debian/Ubuntu:
sudo apt update && sudo apt upgrade -y
- For CentOS/RHEL:
sudo yum update -y
- For Debian/Ubuntu:
- Tip: Consider enabling automatic security updates, but test updates on non-production servers first to avoid unexpected issues.
2. Secure SSH Access
- Change the Default SSH Port:
- Edit
/etc/ssh/sshd_config
and changePort 22
to a custom port (e.g.,Port 2222
). - Restart SSH:
sudo systemctl restart sshd
.
- Edit
- Disable Root Login:
- In
/etc/ssh/sshd_config
, setPermitRootLogin no
. - Create a non-root user with sudo privileges:
adduser username usermod -aG sudo username # Ubuntu/Debian usermod -aG wheel username # CentOS/RHEL
- In
- Use Key-Based Authentication:
- Generate an SSH key pair on your local machine:
ssh-keygen -t rsa -b 4096
- Copy the public key to the server:
ssh-copy-id username@your_server_ip
- Disable password authentication in
/etc/ssh/sshd_config
:PasswordAuthentication no
- Restart SSH:
sudo systemctl restart sshd
.
- Generate an SSH key pair on your local machine:
3. Set Up a Firewall
- Tools:
- UFW (Uncomplicated Firewall) for Ubuntu/Debian:
- Install:
sudo apt install ufw
. - Allow SSH (custom port if changed):
sudo ufw allow 2222/tcp
. - Allow HTTP/HTTPS:
sudo ufw allow 80/tcp
andsudo ufw allow 443/tcp
. - Deny all other incoming traffic:
sudo ufw default deny incoming
. - Enable UFW:
sudo ufw enable
.
- Install:
- FirewallD for CentOS/RHEL:
- Install:
sudo yum install firewalld
. - Start and enable:
sudo systemctl start firewalld && sudo systemctl enable firewalld
. - Allow SSH (custom port):
sudo firewall-cmd --add-port=2222/tcp --permanent
. - Allow HTTP/HTTPS:
sudo firewall-cmd --add-service=http --permanent
andsudo firewall-cmd --add-service=https --permanent
. - Reload firewall:
sudo firewall-cmd --reload
.
- Install:
- UFW (Uncomplicated Firewall) for Ubuntu/Debian:
4. Install and Configure Fail2Ban
- How:
- Install:
- Ubuntu/Debian:
sudo apt install fail2ban
. - CentOS/RHEL:
sudo yum install fail2ban
.
- Ubuntu/Debian:
- Configure:
- Copy the default config:
sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
. - Edit
/etc/fail2ban/jail.local
to enable SSH protection:[sshd] enabled = true port = ssh # or your custom port, e.g., 2222 filter = sshd logpath = /var/log/auth.log # Ubuntu/Debian # logpath = /var/log/secure # CentOS/RHEL maxretry = 3 bantime = 3600
- Restart Fail2Ban:
sudo systemctl restart fail2ban
.
- Copy the default config:
- Install:
5. Monitor and Log Server Activity
- Tools:
- Logwatch: Install (
sudo apt install logwatch
) and configure for daily email reports.
- Logwatch: Install (
- Tip: Check logs regularly (e.g.,
/var/log/auth.log
for SSH activity).
6. Keep Software Updated
- How:
- Run updates regularly:
sudo apt update && sudo apt upgrade
(Ubuntu) orsudo yum update
(CentOS). - Enable unattended security updates (Ubuntu):
sudo apt install unattended-upgrades
and configure/etc/apt/apt.conf.d/50unattended-upgrades
.
- Run updates regularly: