10 tips to keep your Linux servers properly protected

by | Mar 19, 2021

Linux is one of the most secure operating systems out there, but that doesn't mean it's free from attacks or vulnerabilities. Experts recommend always taking extreme precautions. Therefore, we leave you some tips to properly shield Linux servers in our post today.

In LinuxAndUbuntu we found an interesting article including the following security advices:

  1. Set up a non root user. The root user is not considered completely secure to log into the server. It is advisable to create privileged users in the sudo group, since they will always require authentication to make changes in the server.

  2. Improve the login system. It is essential to set strong passwords for users, including numbers, letters, and symbols. With this simple gesture, you will be better protected from brute force attacks. To avoid entering the password each time you log into the server, you can create an SSH key.

  3. Keep the server updated. Security updates are pretty frequent in Linux distributions, and it is advisable to install all of them as soon as possible. Setting the server to check for and install unattended updates automatically is an excellent option.

  4. Uninstall unnecessary applications or services. On servers, it is better to remove unnecessary packages, as they can constitute a security threat. If you have several services that perform the same tasks, it is better to keep only one of them.

  5. Close unused server ports. Cyberattackers look for open ports to gain access to servers, so it is best to keep only the ports that are necessary open. You can configure the firewall to block all ports and then open the necessary ones.

  6. Block malicious requests and IP addresses with Fail2ban. This solution analyzes the system logs and blocks malicious attacks and the IP addresses that execute those attacks. Also, it stops brute force attacks that try to discover passwords to access systems.

  7. Configure 2FA. Two-factor authentication provides an extra layer of security when accessing the server. Once the user has entered his credentials, the system demands a second one-time password that is sent to the user.

  8. Change the default ports of SSH services. SSH & FTP services are more likely to be attacked. Therefore, it is highly recommended changing the ports that come by default.

  9. Use Spamassassin to scan and delete spam emails. This tool scans all incoming emails that reach an email server, detects and blocks malicious and unwanted ones.

  10. Perform security audits regularly. Regular checks are the best way to make sure your server is adequately protected. It is crucial to verify that security tools start at system startup and manually monitor storage, memory usage, and system logs.

For some extra tips, check out the full article at LinuxAndUbuntu

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content