1. Password and account number
Login Password Policy: Edit the/etc/login.defs file, modify the minimum password length
/etc/security file restricts the root user login console, using the # symbol to comment out the console that does not permit root user, such as land;
BIOS Password Settings
Lilo single-user mode set password limit, modified in/etc/lilo.conf file
2. User Rights Assignment and settings
The configuration file in the system, set the immutable property, for some log files the best setting can only add attributes;
Mount file system is limited;
sudo user rights Assignment;
ACL (GETFACL,SETFACL) permission settings;
3. Disable root login directly via SSH port
Create an administrative user, and give sudo permission
/etc/sudoers file that allows ordinary users to get root privileges via sudo
Set the automatic logout account time to 10 minutes
4, service management aspects
Open log
Turn off the ping service
Turn off common security vulnerability services, such as SendMail and SNMP
Modify SSH default port 22 to * * *, increase the difficulty of illegal users to hack SSH port
-------------------------------------------------------------------------
Configure the SSH logging feature to record who has logged in to your server via SSH
In the last write:
Sshd:ALL:spawn echo ' Date '%c access my sshd >>/etc/sshlog
Spawn indicates that the following command is executed
' Date ' represents the command to execute date, showing the time of the current system
%c indicates the user source IP address
----------------------------------------------------------------------------------
5, iptables firewall set some settings for the network segment
This article is from the "Hero's book" blog, please be sure to keep this source http://lmjshe.blog.51cto.com/2827880/1595390
What security policies can you think of when Linux systems are installed?