Red Hat Linux 9 Security Guide

2025-02-10

Securing your Red Hat Linux 9 system is crucial for maintaining the integrity and confidentiality of your data. Below are some practical commands and configurations to enhance your system’s security.

1. Update Your System

Ensure your system is up-to-date with the latest security patches:

sudo dnf update

2. Enable and Configure Firewall

Red Hat Linux uses `firewalld` to manage firewall rules. Enable and start the firewall:

sudo systemctl enable firewalld
sudo systemctl start firewalld

Add a service to the firewall (e.g., SSH):

sudo firewall-cmd --permanent --add-service=ssh
sudo firewall-cmd --reload

3. Secure SSH Access

Edit the SSH configuration file to enhance security:

sudo vi /etc/ssh/sshd_config

Change the following lines:

PermitRootLogin no
PasswordAuthentication no

Restart the SSH service:

sudo systemctl restart sshd

4. Install and Configure SELinux

SELinux provides an additional layer of security. Ensure it is enabled and in enforcing mode:

sudo vi /etc/selinux/config

Set:

SELINUX=enforcing

Check the status:

sestatus

5. Audit System Logs

Use `auditd` to monitor system activities:

sudo dnf install audit
sudo systemctl enable auditd
sudo systemctl start auditd

Add a rule to monitor access to a specific file:

sudo auditctl -w /etc/passwd -p rwxa

6. Disable Unnecessary Services

List all enabled services:

systemctl list-unit-files --type=service | grep enabled

Disable unnecessary services (e.g., `telnet`):

sudo systemctl disable telnet.socket

7. Use Strong Passwords

Enforce strong password policies:

sudo vi /etc/security/pwquality.conf

Set:

minlen = 12
dcredit = -1
ucredit = -1
ocredit = -1
lcredit = -1

8. Monitor User Activities

Install and configure `psacct` to monitor user activities:

sudo dnf install psacct
sudo systemctl enable psacct
sudo systemctl start psacct

View user activity:

ac

9. Encrypt Disk Partitions

Use `LUKS` to encrypt disk partitions:

sudo cryptsetup luksFormat /dev/sdX
sudo cryptsetup luksOpen /dev/sdX my_encrypted_partition
sudo mkfs.ext4 /dev/mapper/my_encrypted_partition

10. Regular Backups

Schedule regular backups using `cron`:

sudo crontab -e

Add:

0 2 * * * /usr/bin/rsync -a /home /backup

What Undercode Say

Securing a Red Hat Linux 9 system involves a multi-layered approach, combining system updates, firewall configurations, SSH security, SELinux, and regular monitoring. By following the above steps, you can significantly reduce the attack surface and protect your system from potential threats.

  1. System Updates: Regularly updating your system ensures that you have the latest security patches. Use `dnf update` to keep your system current.

  2. Firewall Configuration: `firewalld` is a powerful tool to manage network traffic. Always enable it and configure it to allow only necessary services.

  3. SSH Security: Disabling root login and password authentication for SSH adds an extra layer of security. Use key-based authentication instead.

  4. SELinux: Enabling SELinux in enforcing mode provides mandatory access control, which can prevent unauthorized access to system resources.

  5. Audit Logs: Monitoring system logs with `auditd` helps in detecting suspicious activities. Regularly review the logs to identify potential security breaches.

  6. Service Management: Disabling unnecessary services reduces the attack surface. Use `systemctl` to manage services effectively.

  7. Password Policies: Enforcing strong password policies ensures that user accounts are secure. Use `pwquality.conf` to set password complexity requirements.

  8. User Activity Monitoring: Tools like `psacct` help in monitoring user activities, which can be useful in identifying malicious actions.

  9. Disk Encryption: Encrypting disk partitions with `LUKS` ensures that data is protected even if the physical disk is compromised.

  10. Regular Backups: Scheduling regular backups with `cron` ensures that you can recover from data loss or corruption.

For further reading, refer to the official Red Hat documentation: Red Hat Enterprise Linux Security Guide.

By implementing these practices, you can create a robust security posture for your Red Hat Linux 9 system, ensuring that your data and resources are well-protected.

References:

Hackers Feeds, Undercode AIFeatured Image

Scroll to Top