../pacu13

ProLUG Admin Course Unit 13 🐧

Original URL: https://trevorsmale.github.io/techblog/post/pacu13/

System Hardening

Linux system hardening involves securing the system by reducing its attack surface through measures such as disabling unnecessary services, enforcing access controls, applying security patches, and using tools like OpenSCAP, STIG compliance frameworks, or the OSCAP Scanner. These tools help automate security audits, enforce compliance standards, and identify vulnerabilities to enhance system security.


Discussion Post 1:

Your security team comes to you with a discrepancy between the production security baseline and something that is running on one of your servers in production. There are 5 servers in a web cluster and only one of them is showing this behavior. They want you to account for why something is different.

How are you going to validate that the difference between the systems?

I am going to assume that I am new to the system in general and have very surface knowledge from fellow staff. I am also assuming we are working with a redhat based system.

Starting off simple

Maybe the problem is an obvious one, so I would just start off with a glance.

Deeper ⛏️

If no low hanging fruit were there, then I would check configurations

Sorting 🪰‘ish from 🌶️

If I do that see something distinctly different, I would employ a more sophisticated approach with difference checking. Given that everything is a structured file, I can append the output from a working system and the goose 🪿 to a new file and run diff against them.

What are you going to look at to explain this?

I think I have answered this above.

What could be done to prevent this problem in the future?


Discussion Post 2:

Your team has been giving you more and more engineering responsibilities. You are being asked to build out the next set of servers to integrate into the development environment. Your team is going from RHEL 8 to Rocky 9.4.

How might you start to plan out your migration?

Observe

Firstly I would gather system information

Capture

Reconstruct

Analyze / Optimize

Build

During the analysis and optimization phase, I would start a playbook with information gathered from previous phases. I would build and run the playbook against VM templates until satisfied.

Deploy

Given the prior phases, my Playbook would be robust and capable of the transition. However, I would ensure a robust backup and rollback plan in the case something fails.

What are you going to check on the existing systems to baseline your build?

  1. Compute Usage
  2. Memory Load
  3. Disk Resources
  4. Networking Metrics

What kind of validation plan might you use for your new Rocky 9.4 systems?

I would have a seperate playbook built that would validate performance against what I was observing during my VM experimentation. Though the environment may differ from that of the VM, I would still be able to discern performance characteristics and notice any outlier differences.


Digging Deeper

  1. Run through this lab: https://killercoda.com/het-tanis/course/Linux-Labs/107-server-startup-process 👍

How does this help you better understand the discussion 13-2 question?

Well when I am gathering a picture of my current security baseline, I can use some of these tools like dmesg and ss to see what possible attack surface I may have.

  1. Run through this lab: https://killercoda.com/het-tanis/course/Linux-Labs/203-updating-golden-image 👍

How does this help you better understand the process of hardening systems?


Reflection Questions

  1. What questions do you still have about this week?

  2. How can you apply this now in your current role in IT? If you’re not in IT, how can you look to put something like this into your resume or portfolio?


Lab Work 🧪

1. You will scan a server for a SCC Report and get a STIG Score 👍

2. You will remediate some of the items from the scan 👍

3. You will rescan and verify a better score. 👍


Discord: https://discord.com/invite/m6VPPD9usw Youtube: https://www.youtube.com/@het_tanis8213 Twitch: https://www.twitch.tv/het_tanis ProLUG Book: https://leanpub.com/theprolugbigbookoflabs KillerCoda: https://killercoda.com/het-tanis