< Return to Video

10 Tips for Hardening your Linux Servers

  • 0:00 - 0:10
    [Music].
  • 0:10 - 0:11
    Hello again, everyone,
  • 0:11 - 0:14
    and welcome back to LearnLinuxTV. Today,
  • 0:14 - 0:17
    I am launching a brand-new series on my channel:
  • 0:17 - 0:21
    Enterprise Linux Security. And in this series, I'm going to talk about,
  • 0:21 - 0:24
    well, Enterprise Linux Security. This is a
  • 0:24 - 0:27
    series that I've been wanting to launch for quite a while, and
  • 0:27 - 0:31
    today's the day. This is episode number one. And in this video,
  • 0:31 - 0:36
    I'm going to go over 10 tips for hardening your Linux servers.
  • 0:36 - 0:38
    Now, some of you out there that are more
  • 0:38 - 0:40
    seasoned when it comes to security than others
  • 0:40 - 0:42
    might feel that some of the tips
  • 0:42 - 0:44
    that I'm giving you in this video are a little,
  • 0:44 - 0:48
    well, entry-level. And that's not completely untrue.
  • 0:48 - 0:52
    This is episode number one, and we do have to start from somewhere.
  • 0:52 - 0:54
    But I really do feel that the tips that
  • 0:54 - 0:55
    I'm going to give you in this video are
  • 0:55 - 0:58
    the most important things to focus your attention
  • 0:58 - 1:00
    on when it comes to hardening your Linux
  • 1:00 - 1:03
    servers. Now, before we get into it, I want
  • 1:03 - 1:08
    to take a moment to mention the sponsor for this video: KernelCare.
  • 1:08 - 1:14
    Keeping servers safe, compliant, and ensuring constant uptime is a full-time job--
  • 1:14 - 1:18
    one that can't be left to chance and one that must be fully automated
  • 1:18 - 1:23
    and fully supported. To do that, you need a live patching tool that
  • 1:23 - 1:26
    integrates with automation tools and vulnerability scanners,
  • 1:26 - 1:28
    supported with the latest patches--and
  • 1:28 - 1:30
    one that lets you decide which patches
  • 1:30 - 1:33
    are rolled out across your organization and runs within your firewall.
  • 1:33 - 1:40
    And KernelCare Enterprise does this. It provides you with more integration, support, and control.
  • 1:40 - 1:43
    It works in your local infrastructure via ePortal,
  • 1:43 - 1:48
    a dedicated patch server that runs internally but outside your firewall.
  • 1:48 - 1:54
    It acts as a bridge between internal patch servers and the main KernelCare patch server.
  • 1:54 - 1:56
    This approach is ideal for staging and
  • 1:56 - 2:00
    production environments that need strict isolation from external networks
  • 2:00 - 2:05
    or require more stringent controls over the patches that are to be applied.
  • 2:05 - 2:09
    KernelCare Enterprise is available for all major Linux distributions
  • 2:09 - 2:13
    and includes priority support 24/7 via live chat,
  • 2:13 - 2:19
    email, or ticket system. Check out KernelCare Enterprise via the URL that's on the screen right now
  • 2:19 - 2:23
    or give the link that's in the description a click.
  • 2:23 - 2:27
    And thank you so much to KernelCare for sponsoring this video
  • 2:27 - 2:31
    as well as many other videos on this channel. I really appreciate it.
  • 2:31 - 2:35
    Now, let's get into my list of 10 things that you can do
  • 2:35 - 2:38
    to harden your Linux servers.
  • 2:38 - 2:50
    [Music].
  • 2:50 - 2:55
    Now, when it comes to my first tip, this is not actually a system tweak or a
  • 2:55 - 3:00
    system change or anything like that. It's all about your mindset. Now, for all
  • 3:00 - 3:04
    I know, you could be a system administrator, you could be a security
  • 3:04 - 3:10
    professional, or you might even be a CTO. Either way, it's very important to
  • 3:10 - 3:12
    understand what an appropriate mindset is
  • 3:12 - 3:17
    when it comes to the security of your servers. So, what do I mean by that?
  • 3:17 - 3:21
    The thing is, it's important to understand what is feasible
  • 3:21 - 3:25
    and infeasible when it comes to the security of your servers.
  • 3:25 - 3:30
    Namely, is it possible to have a completely unhackable server
  • 3:30 - 3:34
    that nobody can break into--that is completely bulletproof?
  • 3:34 - 3:38
    Well, yeah. Absolutely. You could definitely set up a server that is unhackable.
  • 3:38 - 3:42
    Basically, you just put that server under your desk, you don't power it on,
  • 3:42 - 3:46
    and you certainly don't connect a network cable to it. And I guarantee you
  • 3:46 - 3:47
    nobody's going to hack it.
  • 3:47 - 3:49
    But we need to be realistic.
  • 3:49 - 3:52
    A lot of companies out there--maybe even yours--
  • 3:52 - 3:55
    they make money by selling things to the public or
  • 3:55 - 4:00
    providing a service to the public, which requires a public-facing server.
  • 4:00 - 4:01
    And the thing is, there are all kinds of
  • 4:01 - 4:04
    vulnerabilities out there that are being leveraged every day,
  • 4:04 - 4:06
    and new ones are discovered every single day.
  • 4:06 - 4:12
    So, you could be the victim of a vulnerability that hasn't even been publicly disclosed yet.
  • 4:12 - 4:16
    If you follow every tip in this video, you should be relatively fine, but
  • 4:16 - 4:20
    you want to adjust your mindset. You don't want to have the mentality that
  • 4:20 - 4:23
    you are going to be creating perfect
  • 4:23 - 4:28
    servers that cannot be hacked, or that you've just hired this awesome security person
  • 4:28 - 4:32
    and now all your worries are just, you know, not worries anymore.
  • 4:32 - 4:36
    And you can't have that mindset. You have to have the mindset that anything is
  • 4:36 - 4:39
    possible, and you need to be ready for it at all times.
  • 4:39 - 4:43
    Now, I'm not trying to scare you. Well, actually, am I not trying to scare you?
  • 4:43 - 4:46
    Well, I kind of am. But the reality of the situation is, if you
  • 4:46 - 4:49
    follow everything in this video like I mentioned, you should be good--
  • 4:49 - 4:53
    but you should always be prepared for what could happen.
  • 4:53 - 5:05
    [Music].
  • 5:05 - 5:08
    For number two on my list, I really do
  • 5:08 - 5:11
    think that this is going to be one of those things that's going to be
  • 5:11 - 5:15
    painfully obvious to the majority of you guys that are watching this video.
  • 5:15 - 5:20
    But I don't think I can create a security series--especially not an introduction
  • 5:20 - 5:23
    to a security series--and not mention the importance of patching.
  • 5:23 - 5:29
    Now, the thing is, if patching is so obvious, then why do so many companies out there do a
  • 5:29 - 5:32
    terrible job of keeping their servers up to date? I mean,
  • 5:32 - 5:35
    it's almost appalling to me at this point. I've had so many companies out
  • 5:35 - 5:38
    there that I have worked with personally--when
  • 5:38 - 5:41
    I tell them, "You need to patch your servers. There's something critical that
  • 5:41 - 5:45
    is basically going around right now"--and the response I'll get
  • 5:45 - 5:49
    is, "Yeah, maybe next month. I don't think we can do that right now.
  • 5:49 - 5:52
    We have this really important release we've got to get out the door, but
  • 5:52 - 5:57
    I think things should slow down in a month or so, and maybe we'll have you patch our servers then."
  • 5:57 - 6:02
    And then a week later: "Oh my God. We got hacked. What do we do? How did this happen?"
  • 6:02 - 6:06
    It's obvious how this happened. You didn't take security patching seriously,
  • 6:06 - 6:11
    and now you've been owned by one of the vulnerabilities that one of those patches
  • 6:11 - 6:15
    would have protected you from. And I get it--rebooting your servers,
  • 6:15 - 6:19
    or patching your servers (which often does require a reboot),
  • 6:19 - 6:22
    is not easy to do. It's annoying. It's tedious.
  • 6:22 - 6:26
    And it's even harder to design your infrastructure in a way that you don't
  • 6:26 - 6:30
    need to reboot after patching. It causes service disruption. You have to
  • 6:30 - 6:32
    test the patches before you roll them out.
  • 6:32 - 6:35
    It's a big deal for a lot of people. And quite often,
  • 6:35 - 6:40
    some of these patches are created for very important reasons. I mean,
  • 6:40 - 6:44
    security researchers and people that write these security patches--they don’t do it
  • 6:44 - 6:49
    because they have nothing better to do. They do it because they’re actually patching
  • 6:49 - 6:52
    real vulnerabilities. So, you need to keep your servers up to date.
  • 6:52 - 6:55
    And if you don’t currently have a way to do
  • 6:55 - 6:58
    that, then I highly recommend you find a
  • 6:58 - 7:02
    way to do that, or at least work that into your workflow in some way.
  • 7:02 - 7:05
    Now, KernelCare--the sponsor of this video--
  • 7:05 - 7:08
    they actually offers a service called KernelCare.
  • 7:08 - 7:11
    And what that service does is it enables you, the administrator, to
  • 7:11 - 7:15
    live patch your servers. And if you can live patch your servers,
  • 7:15 - 7:18
    then that’s even easier because you won’t need a reboot.
  • 7:18 - 7:23
    A live patch is the process of injecting a patch right into the running kernel,
  • 7:23 - 7:28
    which means you could benefit from that security fix--if it is a kernel-related security fix--
  • 7:28 - 7:31
    right then and there, no reboot required.
  • 7:31 - 7:34
    But even if you don’t go with a service like KernelCare, at least
  • 7:34 - 7:37
    enable unattended upgrades. Various Linux distributions have
  • 7:37 - 7:41
    a similar solution like unattended upgrades.
  • 7:41 - 7:46
    It’s different per distribution, but you get the idea. Automatic updates are your friend because they’ll
  • 7:46 - 7:50
    keep your servers up to date--and that’s a very important thing.
  • 7:50 - 8:02
    [Music].
  • 8:02 - 8:06
    For number three, it’s probably even more obvious than number two,
  • 8:06 - 8:08
    and that is the importance of secure
  • 8:08 - 8:12
    passwords. And by secure, I mean randomly generated passwords.
  • 8:12 - 8:16
    The thing is, you would be surprised by how many hacks out there
  • 8:16 - 8:19
    were done solely because there were weak passwords involved.
  • 8:19 - 8:22
    So, definitely have randomly generated
  • 8:22 - 8:26
    secure passwords for all of your very important servers and services.
  • 8:26 - 8:31
    It’s critical. And that also implies good password management hygiene.
  • 8:31 - 8:33
    Something like Bitwarden or LastPass--
  • 8:33 - 8:35
    something like that--is very important to
  • 8:35 - 8:38
    keep your passwords, because if you forget your passwords, then
  • 8:38 - 8:40
    that’s even worse, right? Because you
  • 8:40 - 8:41
    can’t even get into your own servers.
  • 8:41 - 8:45
    But having really good password hygiene is extremely
  • 8:45 - 8:47
    important. Again, I’m not going to spend a
  • 8:47 - 8:49
    lot of time on this because I think it speaks for itself.
  • 8:49 - 8:56
    But if you, as the administrator for your company, notice some very easy or insecure passwords,
  • 8:56 - 8:59
    you really do need to change them on the spot.
  • 8:59 - 9:04
    Because if you don't, you could have a very long day or week ahead of you.
  • 9:04 - 9:16
    [Music].
  • 9:16 - 9:19
    Now, number four on my list is all about
  • 9:19 - 9:24
    not making things publicly available unless you absolutely have to.
  • 9:24 - 9:28
    Now, I get it. A lot of companies out there have a public-facing website
  • 9:28 - 9:33
    that's very important because you do want your customers to reach your website.
  • 9:33 - 9:37
    In that case, that server does truly need to be open to the public internet.
  • 9:37 - 9:42
    There's just no way around that. However, if a server or service does not
  • 9:42 - 9:45
    need to be public-facing, make sure that it's not.
  • 9:45 - 9:49
    Implement firewall rules that block its ability to be reached from the outside.
  • 9:49 - 9:55
    Now, don't just assume that a service on your company's network is not reachable from the outside
  • 9:55 - 10:00
    after you apply that firewall rule--actually check to make sure that it's not.
  • 10:00 - 10:05
    For example, you can use your phone--just make sure you're not on the company Wi-Fi--
  • 10:05 - 10:09
    and try to access that service. Make sure that you can't do that.
  • 10:09 - 10:14
    That's the only way to be sure that it's not publicly reachable from the outside.
  • 10:14 - 10:18
    If you are allowed to do so and you have permission to do so,
  • 10:18 - 10:21
    you could try a port scan from the outside. That'll really let you know
  • 10:21 - 10:26
    if a service is accessible from the outside. But either way, you do want to make sure of that.
  • 10:26 - 10:31
    Now, one particularly sore point for me is when people make database servers
  • 10:31 - 10:34
    accessible from the outside. And there is almost never
  • 10:34 - 10:38
    an excuse to make a database server accessible from the public internet,
  • 10:38 - 10:42
    unless your company actually offers managed database services.
  • 10:42 - 10:46
    Then, in that case, yeah, you do need to make that database server publicly available.
  • 10:46 - 10:50
    And I'm sure the majority of you guys are not in the business of providing
  • 10:50 - 10:56
    managed database services. So definitely make sure that your database servers are internal-only,
  • 10:56 - 11:00
    because they're probably the back end to your web server or something like that.
  • 11:00 - 11:04
    Just make sure they're not publicly available. It's very important.
  • 11:04 - 11:08
    Having a database server publicly available is one of the scariest things,
  • 11:08 - 11:12
    because there could be personally identifiable information on that server,
  • 11:12 - 11:16
    and your company could end up on the news for all the wrong reasons.
  • 11:16 - 11:21
    Long story made short: just make sure that your database servers,
  • 11:21 - 11:27
    as well as any other servers that don't need to be publicly available, are not publicly available.
  • 11:27 - 11:38
    [Music].
  • 11:38 - 11:43
    Now, number five on my list is closing down SSH.
  • 11:43 - 11:48
    OpenSSH, or simply SSH for short, is one of the greatest things in the
  • 11:48 - 11:52
    Linux community--at least one of the most convenient things in the Linux community--
  • 11:52 - 11:57
    because it allows you, the administrator, to manage your servers or your company's servers
  • 11:57 - 12:01
    from the comfort of your home office or your company's office.
  • 12:01 - 12:05
    Basically, you don't even have to get out of your chair to manage your servers.
  • 12:05 - 12:08
    And think about it--we used to have to walk into the data center to do
  • 12:08 - 12:12
    basically most of the things that we use SSH for nowadays.
  • 12:12 - 12:18
    SSH is awesome. But it's also a very, very, very large target.
  • 12:18 - 12:22
    Because if a remote attacker gets access to SSH,
  • 12:22 - 12:28
    especially as root, they will wreak havoc on your servers. You definitely want to lock down SSH.
  • 12:28 - 12:30
    And there are multiple things that you can do
  • 12:30 - 12:34
    in order to do that, and I have a dedicated video that talks about
  • 12:34 - 12:37
    how to lock down SSH. You should check out that video
  • 12:37 - 12:39
    because it'll tell you everything that you need to know.
  • 12:39 - 12:42
    But in summary, some of the things that you
  • 12:42 - 12:46
    want to do to lock down SSH include, but aren't limited to, ensuring
  • 12:46 - 12:49
    that root access is disabled. You don't want to allow
  • 12:49 - 12:53
    root authentication to SSH. In addition to that,
  • 12:53 - 12:57
    you should also disable password authentication as well
  • 12:57 - 13:02
    and only allow key-based authentication to your servers via SSH.
  • 13:02 - 13:05
    Going a step further, you can lock down SSH to
  • 13:05 - 13:09
    approved or whitelisted IP addresses to ensure that
  • 13:09 - 13:12
    IP addresses on the public internet cannot access
  • 13:12 - 13:16
    SSH on any of your servers. If you have a VPN endpoint,
  • 13:16 - 13:18
    then you can lock down SSH to be
  • 13:18 - 13:21
    accessible only from the IP address
  • 13:21 - 13:25
    of your VPN endpoint, and that would be another step in the right direction.
  • 13:25 - 13:27
    The more you lock down SSH, the better--
  • 13:27 - 13:34
    because it's usually the first target that hackers try to get access to when they want access to your servers.
  • 13:34 - 13:46
    [Music].
  • 13:46 - 13:50
    Now, item number six on my list is all about having multiple
  • 13:50 - 13:55
    layers of security. And what that means is that you should never rely on
  • 13:55 - 13:59
    just one thing. So like I mentioned, I recommended that you lock down
  • 13:59 - 14:04
    SSH, which is great. But if that's all you do, then maybe someone will get
  • 14:04 - 14:09
    access to your servers by another method. So the more layers of
  • 14:09 - 14:16
    security you have, the better. For example, you could consider Fail2Ban on your servers as another layer of protection.
  • 14:16 - 14:20
    Maybe you already have a firewall on that server as well
  • 14:20 - 14:25
    and you are locking down SSH. The more layers of security, the more hoops
  • 14:25 - 14:27
    you force hackers to try to get through in
  • 14:27 - 14:29
    order to get access to your servers, the
  • 14:29 - 14:31
    better--because you are making it that
  • 14:31 - 14:34
    much harder on them to access your server.
  • 14:34 - 14:36
    And after a while, maybe that person will
  • 14:36 - 14:38
    give up and then move on to another server, which is
  • 14:38 - 14:44
    exactly what you want. And only very targeted attacks would continue past that point.
  • 14:44 - 14:47
    But having multiple layers of security--for example, Fail2Ban
  • 14:47 - 14:51
    or a similar service that looks for intrusions in the logs
  • 14:51 - 14:54
    and then blocks IP addresses that basically try to bypass
  • 14:54 - 14:56
    the rules that you've set--that's a good
  • 14:56 - 14:59
    step to have. And other tools as well.
  • 14:59 - 15:01
    The more you have, the better. So try to
  • 15:01 - 15:04
    have multiple layers of security on your servers
  • 15:04 - 15:08
    and make it that much harder for outside intruders to break in.
  • 15:08 - 15:20
    [Music].
  • 15:20 - 15:23
    Now, number seven can be argued that it's not
  • 15:23 - 15:28
    really a security-specific thing, but I think it's important to include on
  • 15:28 - 15:33
    this list because it is very important--and that is the concept of backups.
  • 15:33 - 15:38
    And not just any backups--tested backups. Any backups
  • 15:38 - 15:42
    that you have not tested, and any backups that are not in at least
  • 15:42 - 15:45
    three different places, are not truly backups.
  • 15:45 - 15:49
    So you want to have your backups in, like I mentioned, three different places.
  • 15:49 - 15:53
    One of which should definitely be off-site. And you want to do
  • 15:53 - 15:57
    test restores on those backups to make sure that the backups are good.
  • 15:57 - 16:00
    Because trust me, if your servers go down and you need to restore from a backup,
  • 16:00 - 16:04
    you don't want to explain to your boss that you can't restore the servers
  • 16:04 - 16:09
    because the backups aren't working. And I have seen this happen.
  • 16:09 - 16:12
    It's horrifying, and it's not a good experience for
  • 16:12 - 16:15
    anyone involved. Definitely have backups
  • 16:15 - 16:18
    and have multiple layers of backups in multiple different locations--
  • 16:18 - 16:22
    but especially test those backups. And that ensures that if you are
  • 16:22 - 16:27
    actually facing a security incident and your servers are completely turned
  • 16:27 - 16:30
    inside out, you have backups. So you're probably
  • 16:30 - 16:34
    going to be good. Yes, it's going to be very inconvenient to have a security
  • 16:34 - 16:38
    incident, but you have backups. You can at least get up and running
  • 16:38 - 16:41
    quickly, and your company's data is not in jeopardy and not
  • 16:41 - 16:44
    lost forever--which is very important.
  • 16:44 - 16:46
    Especially if your company is housing
  • 16:46 - 16:49
    very important blueprints for products and things like that.
  • 16:49 - 16:50
    You definitely want to make sure that
  • 16:50 - 16:53
    those items are backed up, and they're backed up securely.
  • 16:53 - 17:05
    [Music].
  • 17:05 - 17:10
    Now, for number eight, it's very important to keep an eye on all of your servers
  • 17:10 - 17:12
    and the overall health of your servers.
  • 17:12 - 17:16
    And monitoring tools will help you do just that.
  • 17:16 - 17:19
    Nagios and Zabbix are two that come to mind immediately.
  • 17:19 - 17:23
    If there's any kind of issue and you have the appropriate checks configured,
  • 17:23 - 17:27
    then you will be notified that there's an issue. And if you know about the
  • 17:27 - 17:29
    problem before your customers know about it,
  • 17:29 - 17:33
    then you actually appear as a very competent IT professional--because
  • 17:33 - 17:38
    you are ahead of the game. You are aware of everything that's going on.
  • 17:38 - 17:39
    And it's not just, you know, a matter of
  • 17:39 - 17:43
    having these monitoring tools enabled--although that goes a long way.
  • 17:43 - 17:46
    You want to make sure that they're checking the right things. You don't want
  • 17:46 - 17:50
    to, for example, be checking for uptime only and then have the server
  • 17:50 - 17:55
    fall over because the disk is full. You should be checking disk space as well.
  • 17:55 - 17:59
    And obviously, website availability goes without saying if it's a web server.
  • 17:59 - 18:03
    And you could even have user checks on your monitoring tools.
  • 18:03 - 18:08
    If there's more than one user that is on that server, it should send you an alert. And you could even configure
  • 18:08 - 18:10
    it that if so much as one user logs into your
  • 18:10 - 18:14
    server, it sends you an alert. So if you're working on the server, for example,
  • 18:14 - 18:15
    and you're doing some administration work
  • 18:15 - 18:20
    and you get that alert that someone is logged into your server--oh yeah, that's fine.
  • 18:20 - 18:22
    That's me, actually. I'm on my server right now,
  • 18:22 - 18:25
    and I'm installing some updates. But if you get that alert and
  • 18:25 - 18:29
    there's no maintenance planned, that's a red flag. Someone got in.
  • 18:29 - 18:32
    So, there are all kinds of different security checks that you can configure.
  • 18:32 - 18:35
    It's very important to have monitoring tools in place.
  • 18:35 - 18:47
    [Music].
  • 18:47 - 18:52
    Now, for number nine. And I have to say, of all the things
  • 18:52 - 18:57
    on this list, number nine is definitely the hardest. It's the most expensive.
  • 18:57 - 19:00
    If you are working for a company and you have some very
  • 19:00 - 19:05
    important services that are running--and maybe you even store personally
  • 19:05 - 19:09
    identifiable information--you really should have a third-party security audit.
  • 19:09 - 19:13
    Now, it's one thing that, you know, you, the administrator,
  • 19:13 - 19:17
    you're checking everything all the time, and that's awesome.
  • 19:17 - 19:20
    But you're only one person. You need someone on the outside to check your
  • 19:20 - 19:23
    servers and make sure that there's nothing that you've missed.
  • 19:23 - 19:28
    But the problem with this, though, is that third-party security audits are
  • 19:28 - 19:30
    extremely expensive. So this is only for
  • 19:30 - 19:34
    those of you out there that work for enterprises that can afford such a thing.
  • 19:34 - 19:38
    But even if you can't afford such a thing right now,
  • 19:38 - 19:41
    you definitely should keep this on the list--because if your company grows
  • 19:41 - 19:45
    and you actually have the ability to hire someone on the outside to
  • 19:45 - 19:48
    basically audit your servers, you definitely should do that.
  • 19:48 - 19:50
    Because they could find something that you've
  • 19:50 - 19:54
    missed, and they might even save you from a major incident.
  • 19:54 - 20:06
    [Music].
  • 20:06 - 20:11
    Now, for number 10, the last item on my list. It's all about business continuity.
  • 20:11 - 20:16
    How are you, as the administrator, going to ensure that your company is back
  • 20:16 - 20:19
    up and running quickly after an incident?
  • 20:19 - 20:23
    And how long do you think it'll take you to get everything back up and running?
  • 20:23 - 20:27
    If your answer to that question is, "Well, a week, because I have to rebuild
  • 20:27 - 20:31
    everything. I have to install all the operating systems. I have to patch everything.
  • 20:31 - 20:36
    I have to reinstall all the applications"--if that's the answer, you're doing it wrong.
  • 20:36 - 20:39
    You should have some sort of automation, images,
  • 20:39 - 20:43
    backups, or something that is going to get you back up and running as
  • 20:43 - 20:46
    quickly as possible. The quicker you can
  • 20:46 - 20:49
    get everything up and running, the better. And if you have an
  • 20:49 - 20:53
    auto-healing environment--which means if a server falls over, a new server,
  • 20:53 - 20:57
    like a virtual server, is provisioned automatically in its place--
  • 20:57 - 21:00
    and that's especially true with containers, for example--you're doing it right.
  • 21:00 - 21:04
    You're doing a great job. Because the answer to that question is,
  • 21:04 - 21:05
    "Well, the server is never down because it
  • 21:05 - 21:09
    automatically brings one back up," and that's really cool. But your answer
  • 21:09 - 21:11
    to this question really determines how
  • 21:11 - 21:14
    good of a business continuity plan you actually have.
  • 21:14 - 21:16
    And if you don't have a plan, you really
  • 21:16 - 21:20
    should draft one. If all of your servers fell over tomorrow, what would be the
  • 21:20 - 21:22
    process for getting everything built back
  • 21:22 - 21:24
    up where it was before you had that
  • 21:24 - 21:26
    incident? And that's going to determine
  • 21:26 - 21:28
    what goes into your business continuity plan.
  • 21:28 - 21:31
    Now, this is something that we could talk about in a future video,
  • 21:31 - 21:33
    but I wanted to plant that seed right
  • 21:33 - 21:37
    now--because a business continuity plan is very important to have.
  • 21:37 - 21:40
    So, there you go. Those are my 10 tips for hardening the
  • 21:40 - 21:44
    security of your Linux servers. I hope it was helpful.
  • 21:44 - 21:47
    Now, I know that a lot of those tips were somewhat entry-level,
  • 21:47 - 21:50
    but again, this is the first episode of this series,
  • 21:50 - 21:54
    and I wanted to give you guys the overall list of
  • 21:54 - 21:56
    important things to consider. And then, in
  • 21:56 - 22:00
    future videos, we will take a look at more of these concepts in greater detail.
  • 22:00 - 22:02
    So, what are some concepts that you think
  • 22:02 - 22:05
    I should cover in this series? What's important to you?
  • 22:05 - 22:07
    Let me know in the comments down below.
  • 22:07 - 22:09
    I look forward to hearing what you have to say,
  • 22:09 - 22:12
    and I will go ahead and create episode two
  • 22:12 - 22:14
    in this series as soon as I possibly can.
  • 22:14 - 22:16
    So definitely subscribe to my channel if
  • 22:16 - 22:19
    you haven't already done so, and I'll see you again very soon.
  • 22:19 - 22:21
    Thanks for watching.
  • 22:21 - 22:47
    [Music].
Title:
10 Tips for Hardening your Linux Servers
Description:

more » « less
Video Language:
English
Duration:
22:48

English subtitles

Revisions Compare revisions