Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
School Of Sre | 6,008 | 2 months ago | 16 | other | HTML | |||||
At LinkedIn, we are using this curriculum for onboarding our entry-level talents into the SRE role. | ||||||||||
Bouncer | 3,238 | 117 | 30 | a month ago | 55 | February 21, 2022 | 37 | mit | PHP | |
Laravel Eloquent roles and abilities. | ||||||||||
Accesscontrol | 1,676 | 87 | 45 | 2 years ago | 10 | February 24, 2018 | 39 | mit | TypeScript | |
Role and Attribute based Access Control for Node.js | ||||||||||
Sentinel | 1,453 | 786 | 136 | a month ago | 47 | April 05, 2022 | 40 | bsd-3-clause | PHP | |
A framework agnostic authentication & authorization system. | ||||||||||
Php Casbin | 1,123 | 27 | 27 | 10 hours ago | 56 | February 17, 2022 | 4 | apache-2.0 | PHP | |
An authorization library that supports access control models like ACL, RBAC, ABAC in PHP . | ||||||||||
Repokid | 1,055 | 16 days ago | 57 | August 25, 2021 | 14 | apache-2.0 | Python | |||
AWS Least Privilege for Distributed, High-Velocity Deployment | ||||||||||
Lock | 916 | 23 | 4 | 5 years ago | 4 | September 16, 2015 | 23 | mit | PHP | |
A flexible, driver based Acl package for PHP 5.4+ | ||||||||||
Php Auth | 842 | 32 | 13 | a year ago | 38 | April 21, 2021 | 30 | mit | PHP | |
Authentication for PHP. Simple, lightweight and secure. | ||||||||||
Spring Guides Translation | 794 | a month ago | 1 | |||||||
Spring官方教程【中文版】,最好的入门指南! | ||||||||||
Ansible Role Security | 647 | 2 months ago | 11 | mit | Jinja | |||||
Ansible Role - Security |
First, a major, MAJOR caveat: the security of your servers is YOUR responsibility. If you think simply including this role and adding a firewall makes a server secure, then you're mistaken. Read up on Linux, network, and application security, and know that no matter how much you know, you can always make every part of your stack more secure.
That being said, this role performs some basic security configuration on RedHat and Debian-based linux systems. It attempts to:
There are a few other things you may or may not want to do (which are not included in this role) to make sure your servers are more secure, like:
geerlingguy.firewall
role on Ansible Galaxy for a flexible example)Again: Your servers' security is your responsibility.
For obvious reasons, sudo
must be installed if you want to manage the sudoers file with this role.
On RedHat/CentOS systems, make sure you have the EPEL repository installed (you can include the geerlingguy.repo-epel
role to get it installed).
No special requirements for Debian/Ubuntu systems.
Available variables are listed below, along with default values (see defaults/main.yml
):
security_ssh_port: 22
The port through which you'd like SSH to be accessible. The default is port 22, but if you're operating a server on the open internet, and have no firewall blocking access to port 22, you'll quickly find that thousands of login attempts per day are not uncommon. You can change the port to a nonstandard port (e.g. 2849) if you want to avoid these thousands of automated penetration attempts.
security_ssh_password_authentication: "no"
security_ssh_permit_root_login: "no"
security_ssh_usedns: "no"
security_ssh_permit_empty_password: "no"
security_ssh_challenge_response_auth: "no"
security_ssh_gss_api_authentication: "no"
security_ssh_x11_forwarding: "no"
Security settings for SSH authentication. It's best to leave these set to "no"
, but there are times (especially during initial server configuration or when you don't have key-based authentication in place) when one or all may be safely set to 'yes'
. NOTE: It is very important that you quote the 'yes' or 'no' values. Failure to do so may lock you out of your server.
security_ssh_allowed_users: []
# - alice
# - bob
# - charlie
A list of users allowed to connect to the host over SSH. If no user is defined in the list, the task will be skipped.
security_ssh_allowed_groups: []
# - admins
# - devs
A list of groups allowed to connect to the host over SSH. If no group is defined in the list, the task will be skipped.
security_sshd_state: started
The state of the SSH daemon. Typically this should remain started
.
security_ssh_restart_handler_state: restarted
The state of the restart ssh
handler. Typically this should remain restarted
.
security_sudoers_passwordless: []
security_sudoers_passworded: []
A list of users who should be added to the sudoers file so they can run any command as root (via sudo
) either without a password or requiring a password for each command, respectively.
security_autoupdate_enabled: true
Whether to install/enable yum-cron
(RedHat-based systems) or unattended-upgrades
(Debian-based systems). System restarts will not happen automatically in any case, and automatic upgrades are no excuse for sloppy patch and package management, but automatic updates can be helpful as yet another security measure.
security_autoupdate_blacklist: []
(Debian/Ubuntu only) A listing of packages that should not be automatically updated.
security_autoupdate_reboot: false
(Debian/Ubuntu only) Whether to reboot when needed during unattended upgrades.
security_autoupdate_reboot_time: "03:00"
(Debian/Ubuntu only) The time to trigger a reboot, when needed, if security_autoupdate_reboot
is set to true
. In 24h "hh:mm" clock format.
security_autoupdate_mail_to: ""
security_autoupdate_mail_on_error: true
(Debian/Ubuntu only) If security_autoupdate_mail_to
is set to an non empty value, unattended upgrades will send an e-mail to that address when some error occurs. You may either set this to a full email: [email protected]
or to something like root
, which will use /etc/aliases
to route the message. If you set security_autoupdate_mail_on_error
to false
you'll get an email after every package install.
security_fail2ban_enabled: true
Whether to install/enable fail2ban
. You might not want to use fail2ban if you're already using some other service for login and intrusion detection (e.g. ConfigServer).
security_fail2ban_custom_configuration_template: "jail.local.j2"
The name of the template file used to generate fail2ban
's configuration.
None.
- hosts: servers
vars_files:
- vars/main.yml
roles:
- geerlingguy.security
Inside vars/main.yml
:
security_sudoers_passworded:
- johndoe
- deployacct
MIT (Expat) / BSD
This role was created in 2014 by Jeff Geerling, author of Ansible for DevOps.