Skip to content

bkaskar/minimally-hardened-bullseye

Repository files navigation

minimally-hardened-bullseye

In a disaster when you start from scratch with a freshly installed Debian system.

When time is of essence but even starting with ansible is not an option. The very first basic system, which can be a trustworthy baseline image, starts here. You can use these scripts to minimally harden the system creating a baseline image just to get up and running. These scripts quickly bring your template on a secure state where it is ready for a base role assignment, and then further fine-tuning can be done for performance improvement of the specific service while keeping the server secure. Follow this document for initial install on direct hardware or VM that can be saved as a template.

A general case would be: #. Installing Debian on Hardware/VM #. Baseline hardening #. Creating a template for future use #. Using hardened template as required per role #. Re-hardening the template or already provisioned server #. Running audits and improving security score #. Comments on additional hardening (nice to have)

You can start at any of the stages above based on your current status. e.g. if you alrady have a system that is installed and you would like to just harden it, you start with baseline hardening but you may not need to create a template. If you just like to know your current state, just run a quick audit instead of the full CIS Benchmarks.

Install Debian

Initial install

Follow this document for initial install on direct hardware or VM that can be saved as a template.

Baseline hardening

Numbered hardening scripts

Run is the 00.harden_existing_system.sh, which essentially calls all of the scripts from 01 to all the way till the last numeric. Make sure you sudo to root.

$ sudo su -

If you are logged in as non-priviledged user say templateid user, you need to enter templateid user's password. sudo many not be installed on a system, so you first need to install sudo at console (as root) and increase the user's basic privileges for now.

# apt install sudo -y

In order to run an individual script just be in the base_hardening directory and run any of the scripts individually i.e. ./04.update_kern_params.sh

If you have an Endpoint Detection and Response (i.e. CrowdStrike in this case), install the falcon sensor agent to make sure it reports into EDR. Make sure you have the customer ID handy for this install.

cd falcon_agent
./install.sh

Reboot the system

Feel free to comment/discuss. More on this:

Releases

No releases published

Packages

No packages published

Languages