NSA - AppLocker Guidance - Configuration guidance for implementing application whitelisting with AppLocker.ERNW - IPv6 Hardening Guide for Windows Servers.Microsoft recommended block rules - List of applications or files that can be used by an attacker to circumvent application whitelisting policies.Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server. ACSC - Securing PowerShell in the Enterprise.ACSC - Hardening Microsoft Windows 10, version 21H1, Workstations.BSI/ERNW - Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities (2021) - focused on Windows 10 LTSC 2019.Microsoft - Windows 10 Enterprise Security.Microsoft - Windows Server Security | Assurance.Ubuntu wiki - Security Hardening Features.SUSE Linux Enterprise Server 12 Security and Hardening Guide.SUSE Linux Enterprise Server 12 SP4 Security Guide.HighOn.Coffee - Security Harden CentOS 7 (2015).Lisenet - CentOS 7 Server Hardening Guide (2017).nixCraft - How to set up a firewall using FirewallD on RHEL 8.DISA STIGs - Red Hat Enterprise Linux 7 (2019).Red Hat - A Guide to Securing Red Hat Enterprise Linux 7.Neo23x0/auditd - Best Practice Auditd Configuration.trimstray - Iptables Essentials: Common Firewall Rules and Commands.ERNW - IPv6 Hardening Guide for Linux Servers.TecMint - 4 Ways to Disable Root Account in Linux.nixCraft - Tips To Protect Linux Servers Physical Console Access.nixCraft - 40 Linux Server Hardening Security Tips (2019 edition).How To Secure A Linux Server - for a single Linux server at home.trimstray - Linux Hardening Checklist - most important hardening rules for GNU/Linux systems (summarized version of The Practical Linux Hardening Guide).trimstray - The Practical Linux Hardening Guide - practical step-by-step instructions for building your own hardened systems and services.CIS Benchmark for Distribution Independent Linux.ANSSI - Configuration recommendations of a GNU/Linux system.Harden the World - a collection of hardening guidelines for devices, applications and OSs (mostly Apple for now).FIRST Best Practice Guide Library (BPGL).Australian Cyber Security Center Publications.US DoD DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs).NSA Cybersecurity Resources for Cybersecurity Professionals and NSA Cybersecurity publications.Security Hardening Guides and Best Practices Hardening Guide Collections Security Hardening Guides and Best Practices.You may also send suggestions on Twitter to or use You may do this by creating issue tickets or forking, editing and sending pull requests. This is work in progress: please contribute by sending your suggestions. A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |