Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
How To Secure A Linux Server | 14,766 | 11 days ago | 21 | cc-by-sa-4.0 | ||||||
An evolving how-to guide for securing a Linux server. | ||||||||||
Lynis | 10,858 | 7 days ago | 1 | February 27, 2018 | 153 | gpl-3.0 | Shell | |||
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. | ||||||||||
Yubikey Guide | 9,587 | 25 days ago | 26 | mit | Shell | |||||
Guide to using YubiKey for GPG and SSH | ||||||||||
The Practical Linux Hardening Guide | 8,217 | 3 years ago | 3 | mit | ||||||
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG). | ||||||||||
Prowler | 8,193 | a day ago | 20 | apache-2.0 | Python | |||||
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more. | ||||||||||
User.js | 7,564 | 2 days ago | 15 | mit | JavaScript | |||||
Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening | ||||||||||
Awesome Security Hardening | 4,279 | 2 months ago | 68 | |||||||
A collection of awesome security hardening guides, tools and other resources | ||||||||||
Bunkerweb | 2,963 | 3 days ago | 4 | August 26, 2022 | 50 | agpl-3.0 | C | |||
🛡️ Make your web services secure by default ! | ||||||||||
User.js | 2,502 | 5 months ago | 50 | mit | JavaScript | |||||
user.js -- Firefox configuration hardening | ||||||||||
Hardentools | 2,427 | 3 months ago | 2 | April 06, 2021 | 13 | gpl-3.0 | Go | |||
Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features. |
The ansible-hardening role applies security hardening configurations from the Security Technical Implementation Guide (STIG) to systems running the following distributions:
For more details, review the ansible-hardening documentation.
Release notes for the project can be found at: https://docs.openstack.org/releasenotes/ansible-hardening
This role can be used with or without OpenStack-Ansible. It requires Ansible 2.3 or later.
All of the variables for this role are in defaults/main.yml
.
This role has no dependencies.
Using the role is fairly straightforward:
- hosts: servers
roles:
- ansible-hardening
This role can be tested easily on multiple platforms using Vagrant.
The Vagrantfile
supports testing on:
To test on all platforms:
vagrant destroy --force && vagrant up
To test on Ubuntu 14.04 only:
vagrant destroy ubuntu1404 --force && vagrant up ubuntu1404
To test on Ubuntu 16.04 only:
vagrant destroy ubuntu1604 --force && vagrant up ubuntu1604
To test on CentOS 7 only:
vagrant destroy centos7 --force && vagrant up centos7
Apache 2.0
For more information, join #openstack-ansible
on OFTC.