Operating System Security
tag: [Engineer/Developer, Security Specialist, Operations & Strategy, Devops, SRE]
This document outlines some general best practices one should follow with regards to operating system security, however if you're interested in a much more comprehensive guide you could look at NIST 800-123.
Best Practices
- Keep your operating systems updated with the latest security patches and updates.
- Block the remote shell port from all but required IPs.
- Block all ports except absolutely required ones from public.
- Use tools such as fail2ban to protect against attacks.
- Enforce personal account and SSH key login
- Enable multi factor authentication.
- Implement strict access controls to limit administrative privileges and use role-based access control (RBAC).
- Use antivirus and anti-malware software to detect and prevent malicious activities on systems where relevant
- Configure host-based firewalls to control incoming and outgoing network traffic.
- Implement host-based intrusion detection and prevention systems (HIDS/HIPS).
- Follow secure configuration guides, such as the NIST 800-123 guidelines, to harden your operating systems.