当前位置:网站首页>Centos7 operating system security hardening series (2)
Centos7 operating system security hardening series (2)
2020-11-09 22:42:00 【yuanfan2012】
Click on the above "walkingcloud" Focus on , And select " Star standard " official account
1、 Password repeat limit
Rule description : Re enable an old password , Make sure that the password has been changed several times since it was last used . This policy enables administrators to enhance security by ensuring that old passwords are not continuously reused
Audit description : Check the documents /etc/pam.d/system-auth And documents /etc/pam.d/password-auth Whether the following configuration exists :password sufficient pam_unix.so remember=5 or password required pam_pwhistory.so remember=5 among remember Option is greater than or equal to 5
Suggestions for modification : Edit profile /etc/pam.d/system-auth And documents /etc/pam.d/password-auth Modify or add configuration :password sufficient pam_unix.so remember=5 or password required pam_pwhistory.so remember=5 remarks : Use remember=5 The configuration covers the original module configuration
Practical solutions : Edit profile /etc/pam.d/system-auth And documents /etc/pam.d/password-auth Modify or add the following configuration
password required pam_pwhistory.so use_authtok remember=5
2、 File and directory default permission control
Rule description : This setting determines the default permissions for newly created directories and files
Audit description : Check /etc/profile, /etc/profile.d/.sh, /etc/bashrc Of umask Configure to 027( perhaps 0027)
Suggestions for modification : Set up /etc/profile /etc/profile.d/.sh、/etc/bashrc In the document umask Configure to 027( perhaps 0027)
umask Value means : When a user creates a new file or directory , The file or directory has a default permission . The default permission is set by umask Value to specify .umask Value represents permission “ Complement code ”, That is to subtract from the default maximum permission value umask It's worth the actual permission value .
The default maximum permissions for a file are readable and writable , The default maximum permissions for a directory are read, write, and executable .
That is, the actual default permissions of a file are 666 subtract umask value . The actual default permissions for the directory are 777 subtract umask value
resolvent :
sed -i 's/umask 022/umask 027/g' /etc/profile
sed -i 's/umask 022/umask 027/g' /etc/bashrc
Before the change
After modification
3、 Configure user minimum Authorization
Rule description : Check the documents /etc/passwd、/etc/shadow、/etc/group、/etc/services、/etc/xinetd.conf And contents /etc/security Authority
Audit description : Check the documents /etc/passwd、/etc/group、/etc/services Whether the permission of is less than or equal to 644, Check the documents /etc/shadow Whether the permission of is less than or equal to 400, Check /etc/xinetd.conf file 、/etc/security Whether the directory permission is less than or equal to 600, Check whether the owners and groups of the above files and directories are root:root
Suggestions for modification : Settings file /etc/passwd、/etc/group、/etc/services The authority of is 0644, Settings file /etc/shadow The authority of is 0400, Settings file /etc/xinetd.conf、 Catalog /etc/security The authority of is 0600,
For example, to perform :chmod 600 /etc/passwd. Set the owner and group of the above files and directories as root:root, For example, to perform :chown root:root /etc/passwd
Test case information :{ "checkDescription": " In the catalog /etc/security In existence , Check file permissions , Nonexistence pass: stat --format="%U:%G %a" /etc/security 2>/dev/null", "current_value": "/etc/security root:root 0755", "suggest_value": " The file does not exist or /etc/security root:root 600( Or more strictly )" }
To solve the process
stat --format="%U:%G %a" /etc/passwd
stat --format="%U:%G %a" /etc/shadow
ll /etc/shadow
stat --format="%U:%G %a" /etc/group
stat --format="%U:%G %a" /etc/services
stat --format="%U:%G %a" /etc/security
chmod 600 /etc/security
stat --format="%U:%G %a" /etc/security
4、 modify SSH Of Banner Warning message
Rule description : Check ssh Service status , If it is not turned on pass, If on, check if it is set ssh Login alarm information , Setting rules pass
Audit description : Check ssh Service status , If it is not turned on pass, If open, check /etc/ssh/sshd_config file , Whether to configure Banner, Get its path file , Check that the file is not empty , If it is not empty pass
Suggestions for modification : If ssh Service doesn't need , The service needs to be shut down . if necessary ssh service , You need to configure /etc/ssh/sshd_config In file Banner
[root@VM_Server ~]# grep "^\s*Banner\s*" /etc/ssh/sshd_config 2>/dev/null | awk '{print $2}'
[root@VM_Server ~]# grep "Banner*" /etc/ssh/sshd_config 2>/dev/null | awk '{print $2}'
none
[root@VM_Server ~]# grep "Banner*" /etc/ssh/sshd_config 2>/dev/null
#Banner none
[root@VM_Server ~]# sed -i "s/#Banner none/Banner \/etc\/issue.net/g" /etc/ssh/sshd_config
[root@VM_Server ~]# echo "Authorized users only. All activity may be monitored and reported.">/etc/issue.net
[root@VM_Server ~]# service sshd restart
5、 Set key file properties
Rule description : Check /var/log/messages Does the file exist a attribute
Audit description : Check /var/log/messages Does the file exist a attribute :lsattr /var/log/messages | cut -b 6
Suggestions for modification : Use the command to change the log file properties :chattr +a /var/log/messages
lsattr /var/log/messages
lsattr /var/log/messages | cut -b 6
chattr +a /var/log/messages
lsattr /var/log/messages | cut -b 6
This article is from WeChat official account. - WalkingCloud(WalkingCloud2018).
If there is any infringement , Please contact the [email protected] Delete .
Participation of this paper “OSC Source creation plan ”, You are welcome to join us , share .
版权声明
本文为[yuanfan2012]所创,转载请带上原文链接,感谢
边栏推荐
- JT Jingtao project
- Hengxun Technology: the way to deal with server downtime
- Must see! RDS database all in one
- November 09, 2020: talk about the similarities and differences between the bulon filter and the cuckoo filter?
- Dongge ate grapes when he ate an algorithm problem!
- asp.net Using serilog in core and customizing enrich
- [QT] subclass QObject + movetothread to realize multithreading
- Can public IP address and SSL certificate improve SEO?
- Postman(一)---功能介绍
- Quick for imx6ull development board c program call shell
猜你喜欢
Postman (1) -- function introduction
How to greatly improve the performance of larravel framework under php7? Install stone!
毕业即失业?大学生如何分配学习时间比例,拥有完整计算机知识体系?
Performance evaluation report of YoMo codec - Y3
On the practical application of C 9's new features
win7+vs2015+cuda10.2配置TensorRT7.0
sql 大小写转换,去掉前后空格
Top 5 Chinese cloud manufacturers in 2018: Alibaba cloud, Tencent cloud, AWS, telecom, Unicom
11.9
Python中[:]与[::]的用法
随机推荐
sql 筛选查询重复列
SQL intercepts the data before and after the '.'
Can public IP address and SSL certificate improve SEO?
Postman(一)---功能介绍
No space left on device
Hengxun Technology: the way to deal with server downtime
Interviewer: what are cache penetration, cache avalanche and cache breakdown?
November 09, 2020: talk about the similarities and differences between the bulon filter and the cuckoo filter?
How can financial management system help enterprises realize financial automation management?
Low power Bluetooth single chip helps Internet of things
Analysis steps of commodity background management
Expect ':' at 0, actual = (JSON conversion exception resolution)
2018中国云厂商TOP5:阿里云、腾讯云、AWS、电信、联通 ...
How to make a set of K reverse linked lists
Must see! RDS database all in one
What is the architecture of a live broadcast system worth more than $1 billion?
Python调用飞书发送消息
价值超10亿美元的直播系统架构图是什么样子的?
ERP的权限管理的操作与设计--开源软件诞生24
IP地址SSL证书