Server readiness
This section deals with security mechanisms that need to be implemented in the servers, which will be deployed in your environment:
Sr. no. | Point | Description |
1 | SSH password authentication is a no no, only key-based authentication | Never use SSH password-based authentication, use key-based authentication always. |
2 | Auditing is a must | One should have keen awareness of what is happening in the server and who is making the changes. AuditD is a great daemon, which can give us granular visibility. Make sure to implement and configure AuditD in your server environment. |
3 | File integrity monitoring is an integral part of the server | FIM is a very important part of server security. There should be base hash created for all the files and binaries before the server goes to deployment in any environment ( |
4 | Vulnerability assessment is a key | Every week there is some kind of vulnerability, which is discovered and exploits are released... |