Linux Server Secure Login considerations
Remove unnecessary users
Remove unnecessary groups of users
Set the responsible login password (case, number, letter, underscore, special character)
Disable root for remote login, use normal user login server, switch the Administrator account again
Less Su, more use of sudo for Rights Management, sudoer user Rights Assignment
Use the key, save the public key on the server, and use the private key locally to connect to the server
Set up SSH, such as the number of login failures to prevent brute force.
User login history, log login time, login IP, Operation command
Set up ip,tcp firewall, Iptables,tcp_wrapper
Reasonable setting of file permissions, especially temporary files
Installation of high-security software, the server was attacked in part by the vulnerability of the software to complete
Delete system version information, welcome information
Use tools for security detection, such as rootkits, without the front door, intrusion via website, software vulnerability
Shielded ctrl,alt,delete Three keys simultaneously press to restart the machine
Linux Server Secure Login considerations