-
Notifications
You must be signed in to change notification settings - Fork 135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
More hardening possibilities #38
Comments
Do you think this can be a good idea to imagine a 6th (maybe more) hardening level with additional restrictive check not cover by CIS (but keep CIS+bonus check by default) ? |
I don't really understand what you mean. |
Exactly If I understand actual logic :
My point is more organizational, the actual behavior is completly adapt to CIS, but limited to add another category of checks, this can be usefull to imagine :
This can permit to maintain different referential and add easily a role aspect. It's an idea but maybe should be study before go outside CIS checks |
to complete point, if multiple directory tree can be complex to maintain maybe the behavior can fit with an optional |
Yeah I think that maintaining a tree like that is a bit overkill. Replacing the comment that show which category the check belongs to by a true variable will be a better choice. |
nice thanks, so now we can come back to subject "hardening additional guides" and select which additional checks should be implemented (in standard) It's seems this guide focus on :
I think all tuning are not applicable to debian because seems related to newest kernel (maybe for debian 11) |
Yes I globally agree with you on the point that seems relevant. Sandboxing is very poor in the CIS because it's hard to automatically configure or test (even more so with SELinux which has been abandoned in debian CIS 10) On the kernel version, it seems that Debian 9 ships 4.9 by default, Debian 10 ships 4.19 by default. Physical security seems a bit overkill indeed. |
I have found this guide https://madaidans-insecurities.github.io/guides/linux-hardening.html made by a core developer of Whonix .
It comes back on many points already implemented but also describes many others. It could be interesting to look at this and to implement some of the recommendations as bonus checks.
The text was updated successfully, but these errors were encountered: