Partner links

Initial steps to secure Rocky Linux 8

rocky linux

Introduction

Rocky Linux is a downstream, binary-compatible Linux distribution of Red Hat Enterprise Linux (RHEL). It was founded by a co-founder of CentOS Linux after Red Hat announced that CentOS will no longer be developed in its current format. I wrote this article back in May of this year for Vultr to show how to improve the security posture of a Rocky Linux 8 server.

It involves:

  • Use an SSH key for remote login authentication
  • Creating a new standard user account and grant it sudo privileges
  • Disabling SSH access for the root user
  • Changing the default SSH port
  • Disabling FirewallD zone drifting

Continue reading…

Share:

Facebook
Twitter
Pinterest
LinkedIn

Partner links

Newsletter: Subscribe for updates

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments

Get the latest

On social media

Security distros

Hacker
Linux distros for hacking and pentesting

Crypto mining OS

Bitcoin
Distros for mining bitcoin and other cryptocurrencies

Crypto hardware

MSI GeForce GTX 1070
Installing Nvidia GTX 1070 GPU drivers on Ubuntu

Disk guide

LVM
Beginner's guide to disks & disk partitions in Linux

Bash guide

Bash shell terminal
How to set the PATH variable in Bash
Categories
Archives
0
Hya, what do you think? Please comment.x
()
x