Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
linux:security [2024/07/13 01:30] – [FIPS security for ubuntu] admin | linux:security [2025/02/05 12:37] (current) – [Library] admin | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Library ====== | ||
+ | |||
+ | https:// | ||
+ | |||
+ | https:// | ||
+ | |||
+ | opensource opsec review | ||
+ | |||
====== Linux Security | ====== Linux Security | ||
* https:// | * https:// | ||
+ | |||
+ | ====== Zerotrust ====== | ||
+ | https:// | ||
====== Zerotrust Browser ====== | ====== Zerotrust Browser ====== | ||
Line 13: | Line 24: | ||
====== FIPS security for ubuntu ====== | ====== FIPS security for ubuntu ====== | ||
- | - Auditing an Ubuntu | + | - USG - Ubuntu |
+ | # USG - Ubuntu Security Guide (usg) | ||
+ | |||
+ | sudo apt-get install libopenscap8 | ||
+ | oscap -v | ||
+ | oscap -V | ||
+ | |||
+ | sudo apt install ubuntu-advantage-tools | ||
+ | sudo ua attach ||||| | ||
+ | sudo ua enable usg | ||
+ | sudo apt install usg -y | ||
+ | |||
+ | # generate report in / | ||
+ | sudo usg audit cis_level1_server | ||
+ | |||
+ | TAILOR_FILENAME=tailor_cis_level1_server$(date +" | ||
+ | |||
+ | # generate tailor for customize | ||
+ | sudo usg generate-tailoring cis_level1_server $TAILOR_FILENAME | ||
+ | |||
+ | #turn all off | ||
+ | sed -i ' | ||
+ | |||
+ | |||
+ | # turn all what we need | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | sed -i '/ | ||
+ | |||
+ | |||
+ | usg audit --tailoring-file $TAILOR_FILENAME | ||
+ | |||
+ | |||
+ | sudo usg generate-fix | ||
+ | |||
+ | |||
+ | </ | ||
+ | ++ | ||
+ | |||
+ | ====== Openscap ====== | ||
+ | |||
+ | - Security Technical Implementation Guide | ||
+ | - https:// | ||
+ | - https:// | ||
+ | - https:// | ||
+ | - ++ Detail|< | ||
+ | |||
sudo apt-get install libopenscap8 | sudo apt-get install libopenscap8 | ||
oscap -v | oscap -v | ||
oscap -V | oscap -V | ||
- | | ||
- | sudo apt install ubuntu-advantage-tools | ||
- | sudo ua attach sdfsdf | ||
- | sudo ua enable usg | ||
- | sudo apt install usg -y | ||
sudo oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis_level1_server --results-arf arf.xml --report $1 / | sudo oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis_level1_server --results-arf arf.xml --report $1 / | ||
- | | ||
- | mkdir report | ||
- | sudo usg generate-tailoring disa_stig tailor.xml | ||
- | | ||
- | # Audit using the new tailoring file | ||
- | sudo usg audit --tailoring-file tailor.xml | ||
- | # Fix using the new tailoring file | ||
- | # USG fix: Proceed with extreme caution. Document all steps. | ||
- | # CAUTION! | ||
- | # generate fix.file for cis_level1_server | + | oscap info / |
- | | + | |
- | </code> | + | |
- | ++ | + | |
- | ====== Openscap ====== | ||
- | <code BASH> | ||
- | sudo oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis_level1_server --results-arf arf.xml --report ./rep / | ||
- | </ | ||
+ | oscap xccdf generate fix --profile xccdf_org.ssgproject.content_profile_stig --fix-type bash / | ||
+ | grep '2 echo "' | ||
+ | </ | ||
+ | ++ |