This section deals with security mechanisms that need to be implemented in the servers, which will be deployed in your environment:
Sr. no. |
Point |
Description |
1 |
SSH password authentication is a no no, only key-based authentication |
Never use SSH password-based authentication, use key-based authentication always. |
2 |
Auditing is a must |
One should have keen awareness of what is happening in the server and who is making the changes. AuditD is a great daemon, which can give us granular visibility. Make sure to implement and configure AuditD in your server environment. |
3 |
File integrity monitoring is an integral part of the server |
FIM is a very important part of server security. There should be base hash created for all the files and binaries before the server goes to deployment in any environment (dev, staging, and prod). OSSEC is a great... |