Tag

Hardening

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Apr 16, 2025 · Information Security

Boost Linux Server Security: Practical Hardening Steps for RHEL7

This guide walks through a comprehensive Linux hardening checklist for RHEL7, covering account locking, password policies, SSH port changes, SELinux activation, firewall tightening, and file attribute protections to elevate the system to a B1 security level.

HardeningRHEL7SELinux
0 likes · 12 min read
Boost Linux Server Security: Practical Hardening Steps for RHEL7
Laravel Tech Community
Laravel Tech Community
Jul 20, 2023 · Information Security

Nginx Security Hardening: Preventing DDoS, SQL Injection, XSS, and Other Attacks

This guide outlines practical Nginx configuration techniques to mitigate DDoS, SQL injection, path traversal, XSS, host header injection, clickjacking, and other security threats while also covering SSL/TLS encryption, server token hiding, and essential command‑line operations.

DDoSHardeningSQL injection
0 likes · 6 min read
Nginx Security Hardening: Preventing DDoS, SQL Injection, XSS, and Other Attacks
Cloud Native Technology Community
Cloud Native Technology Community
Jun 30, 2022 · Cloud Native

Top 10 Kubernetes Application Security Hardening Techniques

This article presents ten practical methods for hardening Kubernetes application manifests, covering securityContext settings such as runAsUser, privileged mode, capabilities, read‑only root filesystem, privilege escalation, Seccomp, resource limits, image tagging, and optional AppArmor/SELinux policies, to reduce attack surface during development and deployment.

ContainersDevOpsHardening
0 likes · 11 min read
Top 10 Kubernetes Application Security Hardening Techniques
Efficient Ops
Efficient Ops
May 4, 2022 · Information Security

How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do

This article recounts a real‑world incident where a SpringBoot server was compromised by a crypto‑mining malware, details the malicious code and its actions, shows forensic traces left on the system, and provides step‑by‑step remediation and hardening recommendations.

HardeningServer SecuritySpringBoot RCE
0 likes · 12 min read
How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do
Architecture Digest
Architecture Digest
Mar 20, 2022 · Information Security

Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices

This guide provides a detailed, step‑by‑step hardening strategy for Linux systems, covering distro selection, kernel choices, extensive sysctl tweaks, boot‑loader parameters, MAC policies, sandboxing, memory allocator hardening, compile‑time mitigations, root account protection, firewall rules, swap configuration, PAM policies, microcode updates, IPv6 privacy, partition mounting options, entropy sources, and physical security measures.

HardeningKernelboot
0 likes · 51 min read
Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices
Efficient Ops
Efficient Ops
Jan 24, 2021 · Information Security

How to Harden Linux Servers: Essential Security Practices Every Ops Engineer Should Know

This guide outlines comprehensive Linux security hardening steps—including account protection, service minimization, password policies, sudo usage, file system safeguards, rootkit detection tools, and post‑attack response—to help operations teams secure their servers against common threats.

HardeningRootkitSysadmin
0 likes · 26 min read
How to Harden Linux Servers: Essential Security Practices Every Ops Engineer Should Know
Efficient Ops
Efficient Ops
Feb 12, 2020 · Information Security

Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection

This guide presents a comprehensive Linux security hardening checklist covering account and login safety, unnecessary service removal, password and key authentication policies, sudo usage, filesystem protection, remote access safeguards, rootkit detection tools, and step‑by‑step incident response for compromised servers.

Account ManagementHardeningRootkit
0 likes · 27 min read
Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection