Tag

system hardening

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Mar 12, 2025 · Information Security

30 High-Risk Ports You Must Secure and How to Close Them

This guide lists 30 commonly exposed high‑risk ports such as LDAP, MySQL, and Docker, explains the security threats they pose, and provides practical firewall, service‑management, and port‑closing steps—including command‑line examples—to help you harden your systems against attacks.

Network Securityfirewallhigh-risk ports
0 likes · 7 min read
30 High-Risk Ports You Must Secure and How to Close Them
Efficient Ops
Efficient Ops
Oct 8, 2024 · Operations

Master Linux Process & User Queries with Powerful Bash Scripts

This guide provides Bash scripts that let you retrieve detailed information about Linux processes by PID or name, query user account details, and apply a series of system hardening tweaks such as password policies, login restrictions, and file attribute protections.

LinuxProcess Managementbash
0 likes · 12 min read
Master Linux Process & User Queries with Powerful Bash Scripts
DevOps Operations Practice
DevOps Operations Practice
Mar 6, 2024 · Information Security

Comprehensive Linux System Hardening Guide for Production Environments

This guide details practical Linux hardening steps—including disabling SELinux, trimming startup services, applying the principle of least privilege, configuring sudo, synchronizing time, adjusting file descriptor limits, locking critical files, disabling ping, optimizing SSH, changing hostnames, and preventing destructive rm commands—to improve security and stability in production deployments.

LinuxSELinuxoperations
0 likes · 12 min read
Comprehensive Linux System Hardening Guide for Production Environments
DevOps
DevOps
Jun 2, 2020 · Information Security

How to Enhance the Security of JumpServer: Best Practices and Recommendations

This article outlines ten essential steps to strengthen JumpServer security, including upgrading the operating system and JumpServer software, updating dependencies, avoiding weak passwords, enabling OS security components, minimizing open ports, securing public access, configuring SSL, enforcing strong passwords, and enabling multi‑factor authentication.

Jumpserverbastion hostbest practices
0 likes · 5 min read
How to Enhance the Security of JumpServer: Best Practices and Recommendations
Efficient Ops
Efficient Ops
Aug 28, 2019 · Operations

How to Harden Linux Server Security: Account, Login, and Boot Controls

This guide details practical Linux server hardening techniques—including account cleanup, password policies, su/sudo restrictions, login controls, and BIOS/GRUB protection—while providing exact command examples for operations teams to quickly improve system security.

Account ManagementLinuxoperations
0 likes · 12 min read
How to Harden Linux Server Security: Account, Login, and Boot Controls
Efficient Ops
Efficient Ops
Jul 2, 2017 · Operations

How to Build a Multi‑Layered Security Defense: Practical Ops Strategies

This article outlines a comprehensive, multi‑layered security framework for operations teams, covering policy design, dual‑account permission separation, grid‑based vulnerability management, topology and network safeguards, OS and database hardening, common misconceptions, and actionable principles for maintaining robust protection.

Network Securityaccess controloperations
0 likes · 31 min read
How to Build a Multi‑Layered Security Defense: Practical Ops Strategies
Efficient Ops
Efficient Ops
Jul 30, 2015 · Information Security

Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies

This article summarizes a comprehensive ops security talk that breaks down network segmentation, system hardening, and permission management into layered defenses, offering practical guidance on VLANs, ACLs, least‑privilege principles, and account auditing for robust enterprise protection.

Network Securityaccess controlinformation security
0 likes · 11 min read
Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies