awesome-security-hardening

Security hardening guides

A collection of security hardening guides, tools, and resources for various operating systems and applications.

A collection of awesome security hardening guides, tools and other resources

GitHub

6k stars
139 watching
581 forks
last commit: about 2 months ago
Linked from 1 awesome list

awesome-listbest-practicesblue-teamblueteamcis-benchmarkscomputer-securitycyber-securitycybersecurityinfoseclinux-hardeningsecuritysecurity-hardeningsecurity-toolswindows-hardening

Security Hardening Guides and Best Practices / Hardening Guide Collections

CIS Benchmarks (registration required)
ANSSI Best Practices
NSA Cybersecurity Advisories & Guidance
NSA Cybersecurity Resources for Cybersecurity Professionals and
US DoD DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs)
OpenSCAP Security Policies
Australian Cyber Security Center Publications
FIRST Best Practice Guide Library (BPGL)
Harden the World a collection of hardening guidelines for devices, applications and OSs (mostly Apple for now)

Security Hardening Guides and Best Practices / GNU/Linux

ANSSI - Configuration recommendations of a GNU/Linux system
CIS Benchmark for Distribution Independent Linux
trimstray - The Practical Linux Hardening Guide 9,947 over 4 years ago practical step-by-step instructions for building your own hardened systems and services. Tested on CentOS 7 and RHEL 7
trimstray - Linux Hardening Checklist 1,498 almost 5 years ago most important hardening rules for GNU/Linux systems (summarized version of The Practical Linux Hardening Guide)
How To Secure A Linux Server 17,554 about 1 month ago for a single Linux server at home
nixCraft - 40 Linux Server Hardening Security Tips (2019 edition)
nixCraft - Tips To Protect Linux Servers Physical Console Access
TecMint - 4 Ways to Disable Root Account in Linux
ERNW - IPv6 Hardening Guide for Linux Servers
trimstray - Iptables Essentials: Common Firewall Rules and Commands 1,483 over 4 years ago
Neo23x0/auditd 1,499 about 1 month ago Best Practice Auditd Configuration
CIRCL TR-83 - Linux Boot Hardening HOWTO How to secure the boot sequence of your Linux based distribution (2024)

Security Hardening Guides and Best Practices / GNU/Linux / Red Hat Enterprise Linux - RHEL

Red Hat - A Guide to Securing Red Hat Enterprise Linux 7
DISA STIGs - Red Hat Enterprise Linux 7 (2019)
CIS Benchmark for Red Hat Linux
nixCraft - How to set up a firewall using FirewallD on RHEL 8

Security Hardening Guides and Best Practices / GNU/Linux / CentOS

Lisenet - CentOS 7 Server Hardening Guide (2017)
HighOn.Coffee - Security Harden CentOS 7 (2015)

Security Hardening Guides and Best Practices / GNU/Linux / SUSE

SUSE Linux Enterprise Server 12 SP4 Security Guide
SUSE Linux Enterprise Server 12 Security and Hardening Guide

Security Hardening Guides and Best Practices / GNU/Linux / Ubuntu

Ubuntu documentation - Security
Ubuntu wiki - Security Hardening Features

Security Hardening Guides and Best Practices / Windows

Microsoft - Windows security baselines
Microsoft - Windows Server Security | Assurance
Microsoft - Windows 10 Enterprise Security
BSI/ERNW - Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities (2021) - focused on Windows 10 LTSC 2019
ACSC - Hardening Microsoft Windows 10, version 21H1, Workstations
ACSC - Securing PowerShell in the Enterprise
Awesome Windows Domain Hardening 1,749 almost 5 years ago
Microsoft - How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server
Microsoft recommended block rules List of applications or files that can be used by an attacker to circumvent application whitelisting policies
ERNW - IPv6 Hardening Guide for Windows Servers
NSA - AppLocker Guidance 209 almost 5 years ago Configuration guidance for implementing application whitelisting with AppLocker
NSA - Pass the Hash Guidance 198 almost 8 years ago Configuration guidance for implementing Pass-the-Hash mitigations (Archived)
NSA - BitLocker Guidance 120 over 5 years ago Configuration guidance for implementing disk encryption with BitLocker
NSA - Event Forwarding Guidance 852 about 4 years ago Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding
Windows Defense in Depth Strategies work in progress
Endpoint Isolation with the Windows Firewall based on Jessica Payne’s talk from Ignite 2016
ZeroSec - Paving The Way to DA red teaming techniques and how to prevent them

Security Hardening Guides and Best Practices / macOS

ERNW - IPv6 Hardening Guide for OS-X

Security Hardening Guides and Best Practices / Network Devices

NSA - Harden Network Devices (PDF) - very short but good summary

Security Hardening Guides and Best Practices / Network Devices / Switches

DISA - Layer 2 Switch SRG v2r1

Security Hardening Guides and Best Practices / Network Devices / Routers

NSA - A Guide to Border Gateway Protocol (BGP) Best Practices

Security Hardening Guides and Best Practices / Network Devices / IPv6

NSA - IPv6 Security Guidance (Jan 2023)
Part 1 ERNW - Developing an Enterprise IPv6 Security Strategy , , , - Network Isolation on the Routing Layer, Traffic Filtering in IPv6 Networks

Security Hardening Guides and Best Practices / Network Devices / Firewalls

NIST SP 800-41 Rev 1 - Guidelines on Firewalls and Firewall Policy (2009)
trimstray - Iptables Essentials: Common Firewall Rules and Commands 1,483 over 4 years ago

Security Hardening Guides and Best Practices / Virtualization - VMware

VMware Security Hardening Guides covers most VMware products and versions
CIS VMware ESXi 6.5 Benchmark (2018)
DISA STIGs - Virtualisation VMware vSphere 6.0 and 5
ENISA - Security aspects of virtualization generic, high-level best practices for virtualization and containers (Feb 2017)
NIST SP 800-125 - Guide to Security for Full Virtualization Technologies (2011)
NIST SP 800-125A Revision 1 - Security Recommendations for Server-based Hypervisor Platforms (2018)
NIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection (2016)
ANSSI - Recommandations de sécurité pour les architectures basées sur VMware vSphere ESXi for VMware 5.5 (2016), in French
ANSSI - Problématiques de sécurité associées à la virtualisation des systèmes d’information (2013), in French
VMware - Protecting vSphere From Specialized Malware (2022) - see also

Security Hardening Guides and Best Practices / Containers - Docker - Kubernetes

How To Harden Your Docker Containers
CIS Docker Benchmarks registration required
NIST SP 800-190 - Application Container Security Guide
A Practical Introduction to Container Security
ANSSI - Recommandations de sécurité relatives au déploiement de conteneurs Docker (2020), in French
Kubernetes Security Checklist
Kubernetes Role Based Access Control Good Practices
Kubernetes Multi-tenancy
Kubernetes blog - A Closer Look at NSA/CISA Kubernetes Hardening Guidance
ReynardSec - Docker Security – Step-by-Step Hardening (Docker Hardening) (2023)

Security Hardening Guides and Best Practices / Services / SSH

NIST IR 7966 - Security of Interactive and Automated Access Management Using Secure Shell (SSH)
ANSSI - (Open)SSH secure use recommendations
Linux Audit - OpenSSH security and hardening
Positron Security SSH Hardening Guides (2017-2018) - focused on crypto algorithms
stribika - Secure Secure Shell (2015) - some algorithm recommendations might be slightly outdated
Applied Crypto Hardening: bettercrypto.org handy reference on how to configure the most common services’ crypto settings (TLS/SSL, PGP, SSH and other cryptographic tools)
IETF - Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) draft-ietf-curdle-ssh-kex-sha2-10 update to the recommended set of key exchange methods for use in the Secure Shell (SSH) protocol to meet evolving needs for stronger security. This document updates RFC 4250
Gravitational - How to SSH Properly how to configure SSH to use certificates and two-factor authentication

Security Hardening Guides and Best Practices / Services / TLS/SSL

NIST SP800-52 Rev 2 (2nd draft) - Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations 2018, recommends TLS 1.3
Netherlands NCSC - IT Security Guidelines for Transport Layer Security (TLS) 2021
ANSSI - Security Recommendations for TLS 2017, does not cover TLS 1.3
Qualys SSL Labs - SSL and TLS Deployment Best Practices 2,167 over 1 year ago 2017, does not cover TLS 1.3
RFC 7540 Appendix A TLS 1.2 Cipher Suite Black List
Applied Crypto Hardening: bettercrypto.org handy reference on how to configure the most common services’ crypto settings (TLS/SSL, PGP, SSH and other cryptographic tools)

Security Hardening Guides and Best Practices / Services / Web Servers

Cipherlist.eu - Strong Ciphers for Apache, nginx and Lighttpd
Apache HTTP Server documentation - Security Tips
GeekFlare - Apache Web Server Hardening and Security Guide
Apache Config - Apache Security Hardening Guide
Apache Tomcat 9 Security Considerations / /
OWASP Securing tomcat
How to get Tomcat 9 to work with authbind to bind to port 80
Eclipse Jetty - Configuring Security
Jetty hardening (2015)
CIS Microsoft IIS Benchmarks

Security Hardening Guides and Best Practices / Services / Mail Servers

MDaemon - 15 Best Practices for Protecting Your Email Generic recommandations but based on MDaemon Security Gateway for Email Servers

Security Hardening Guides and Best Practices / Services / FTP Servers

JSCAPE - Guide for securing FTP Generic recommandations but based on JSCAPE MFT Server

Security Hardening Guides and Best Practices / Services / Database Servers

Netwrix - MS SQL Server Hardening Best Practices

Security Hardening Guides and Best Practices / Services / Active Directory

Microsoft - Best Practices for Securing Active Directory
ANSSI CERT-FR - Active Directory Security Assessment Checklist - 2022 (English and French versions)
"Admin Free" Active Directory and Windows, Part 1- Understanding Privileged Groups in AD
"Admin Free" Active Directory and Windows, Part 2- Protected Accounts and Groups in Active Directory
ASD - Detecting and mitigating Active Directory compromises 2024

Security Hardening Guides and Best Practices / Services / ADFS

adsecurity.org - Securing Microsoft Active Directory Federation Server (ADFS)
Microsoft - Best practices for securing Active Directory Federation Services

Security Hardening Guides and Best Practices / Services / Kerberos

CIS MIT Kerberos 1.10 Benchmark 2012

Security Hardening Guides and Best Practices / Services / LDAP

OpenLDAP Software 2.4 Administrator's Guide - OpenLDAP Security Considerations
Best Practices in LDAP Security (2011)
LDAP: Hardening Server Security (so administrators can sleep at night)
LDAP Authentication Best Practices retrieved from web.archive.org
Hardening OpenLDAP on Linux with AppArmor and systemd slides
zytrax LDAP for Rocket Scientists - LDAP Security
How To Encrypt OpenLDAP Connections Using STARTTLS

Security Hardening Guides and Best Practices / Services / DNS

CIS - BIND DNS Server 9.9 Benchmark (2017)
DISA STIGs - BIND 9.x (2019)
NIST SP 800-81-2 - Secure Domain Name System (DNS) Deployment Guide (2013)
CMU SEI - Six Best Practices for Securing a Robust Domain Name System (DNS) Infrastructure
NSA BIND 9 DNS Security (2011)

Security Hardening Guides and Best Practices / Services / NTP

IETF - Network Time Protocol Best Current Practices draft-ietf-ntp-bcp (last draft #13 in March 2019)
CMU SEI - Best Practices for NTP Services
Linux.com - Arrive On Time With NTP -- Part 2: Security Options
Linux.com - Arrive On Time With NTP -- Part 3: Secure Setup

Security Hardening Guides and Best Practices / Services / NFS

Linux NFS-HOWTO - Security and NFS a good overview of NFS security issues and some mitigations
Red Hat - A Guide to Securing Red Hat Enterprise Linux 7 - Securing NFS
Red Hat - RHEL7 Storage Administration Guide - Securing NFS
NFSv4 without Kerberos and permissions why NFSv4 without Kerberos does not provide security
CertDepot - RHEL7: Use Kerberos to control access to NFS network shares

Security Hardening Guides and Best Practices / Services / CUPS

CUPS Server Security

Security Hardening Guides and Best Practices / Authentication - Passwords

UK NCSC - Password administration for system owners
NIST SP 800-63 Digital Identity Guidelines
OWASP Password Storage Cheat Sheet
ANSSI - Recommendations on multi-factor authentication and passwords (2021, French)

Security Hardening Guides and Best Practices / Hardware - CPU - BIOS - UEFI

ANSSI - Hardware security requirements for x86 platforms recommendations for security features and configuration options applying to hardware devices (CPU, BIOS, UEFI, etc) (Nov 2019)
NSA - Hardware and Firmware Security Guidance 774 over 1 year ago Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance
NSA Info Sheet: UEFI Lockdown Quick Guidance (March 2018)
NSA Tech Report: UEFI Defensive Practices Guidance (July 2017)

Security Hardening Guides and Best Practices / Cloud

NSA Info Sheet: Cloud Security Basics (August 2018)
DISA DoD Cloud Computing Security
asecure.cloud - Build a Secure Cloud A free repository of customizable AWS security configurations and best practices

Tools / Tools to check security hardening

Chef InSpec open-source testing framework by Chef that enables you to specify compliance, security, and other policy requirements. can run on Windows and many Linux distributions

Tools / Tools to check security hardening / GNU/Linux

Lynis script to check the configuration of Linux hosts
OpenSCAP Base oscap command line tool
SCAP Workbench GUI for oscap
Tiger - The Unix security audit and intrusion detection tool (might be outdated)
otseca 486 over 4 years ago Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats
SUDO_KILLER 2,240 5 months ago A tool to identify sudo rules' misconfigurations and vulnerabilities within sudo
CIS Benchmarks Audit 248 7 months ago bash script which performs tests against your CentOS system to give an indication of whether the running server may comply with the CIS v2.2.0 Benchmarks for CentOS (only CentOS 7 for now)

Tools / Tools to check security hardening / Windows

Microsoft Security Compliance Toolkit 1.0 set of tools that allows enterprise security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products
Microsoft DSC Environment Analyzer (DSCEA) simple implementation of PowerShell Desired State Configuration that uses the declarative nature of DSC to scan Windows OS based systems in an environment against a defined reference MOF file and generate compliance reports as to whether systems match the desired configuration
HardeningAuditor 159 almost 5 years ago Scripts for comparing Microsoft Windows compliance with the Australian ASD 1709 & Office 2016 Hardening Guides
PingCastle Tool to check the security of Active Directory
MDE-AuditCheck 97 over 2 years ago Tool to check that Windows audit settings are properly configured in the GPO for Microsoft Defender for Endpoint

Tools / Tools to check security hardening / Network Devices

Nipper-ng 66 over 2 years ago to check the configuration of network devices (does not seem to be updated)

Tools / Tools to check security hardening / TLS/SSL

Qualys SSL Labs - List of tools to assess TLS/SSL servers and clients 2,167 over 1 year ago
CryptoLyzer 26 5 months ago Fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers, DNS records) analyzer and fingerprint (JA3, HASSH tag) generator with Python API and CLI
SSLyze 3,267 3 months ago Fast and powerful SSL/TLS scanning library
testssl.sh 7,987 25 days ago Testing TLS/SSL encryption anywhere on any port

Tools / Tools to check security hardening / SSH

CryptoLyzer 26 5 months ago Fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers, DNS records) analyzer and fingerprint (JA3, HASSH tag) generator with Python API and CLI
ssh-audit 2,960 5 months ago SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)

Tools / Tools to check security hardening / Hardware - CPU - BIOS - UEFI

CHIPSEC: Platform Security Assessment Framework 2,941 8 days ago framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components
chipsec-check 46 about 3 years ago Tools to generate a Debian Linux distribution with chipsec to test hardware requirements

Tools / Tools to check security hardening / Docker

Docker Bench for Security 9,146 about 1 month ago script that checks for dozens of common best-practices around deploying Docker containers in production, inspired by the CIS Docker Community Edition Benchmark v1.1.0

Tools / Tools to check security hardening / Cloud

toniblyx/my-arsenal-of-aws-security-tools 8,983 26 days ago List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc

Tools / Tools to apply security hardening

DevSec Hardening Framework a framework to automate hardening of OS and applications, using Chef, Ansible and Puppet

Tools / Tools to apply security hardening / GNU/Linux

Linux Server Hardener 93 3 months ago for Debian/Ubuntu (2019)
Bastille Linux outdated

Tools / Tools to apply security hardening / Windows

Microsoft Security Compliance Toolkit 1.0 set of tools that allows enterprise security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products
Hardentools 2,931 8 months ago for Windows individual users (not corporate environments) at risk, who might want an extra level of security at the price of some usability
Windows 10 Hardening 172 almost 4 years ago A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible
Disassembler0 Windows 10 Initial Setup Script 4,696 over 3 years ago PowerShell script for automation of routine tasks done after fresh installations of Windows 10 / Server 2016 / Server 2019
Automated-AD-Setup 198 over 3 years ago A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hardening
mackwage/windows_hardening.cmd Script to perform some hardening of Windows 10
Windows 10/11 Hardening Script by ZephrFish 114 9 months ago PowerShell script to harden Windows 10/11

Tools / Tools to apply security hardening / TLS/SSL

Mozilla SSL Configuration Generator

Tools / Tools to apply security hardening / Cloud

toniblyx/my-arsenal-of-aws-security-tools 8,983 26 days ago List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc

Tools / Password Generators

How-To Geek - 10 Ways to Generate a Random Password from the Linux Command Line
Vitux - 8 Ways to Generate a Random Password on Linux Shell
SS64 - Password security and a comparison of Password Generators

Other Awesome Lists

Awesome Cybersecurity Blue Team 4,393 4 months ago A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams

Other Awesome Lists / Other Awesome Security Lists

Awesome Security 12,479 4 months ago A collection of awesome software, libraries, documents, books, resources and cools stuffs about security
Android Security Awesome 8,213 3 months ago A collection of android security related resources
Awesome CTF 9,873 4 months ago A curated list of CTF frameworks, libraries, resources and software
Awesome Cyber Skills 3,672 5 months ago A curated list of hacking environments where you can train your cyber skills legally and safely
Awesome Hacking 13,198 6 months ago A curated list of awesome Hacking tutorials, tools and resources
Awesome Honeypots 8,661 3 months ago An awesome list of honeypot resources
Awesome Malware Analysis 11,989 6 months ago A curated list of awesome malware analysis tools and resources
Awesome PCAP Tools 3,135 7 months ago A collection of tools developed by other researchers in the Computer Science area to process network traces
Awesome Pentest 21,934 29 days ago A collection of awesome penetration testing resources, tools and other shiny things
Awesome Linux Containers 1,811 8 months ago A curated list of awesome Linux Containers frameworks, libraries and software
Awesome Incident Response 7,682 4 months ago A curated list of resources for incident response
Awesome Web Hacking 5,875 2 days ago This list is for anyone wishing to learn about web application security but do not have a starting point
Awesome Threat Intelligence 8,127 3 months ago A curated list of threat intelligence resources
Awesome Pentest Cheat Sheets 3,889 9 months ago Collection of the cheat sheets useful for pentesting
Awesome Industrial Control System Security 28 over 8 years ago A curated list of resources related to Industrial Control System (ICS) security
Awesome YARA 3,566 8 days ago A curated list of awesome YARA rules, tools, and people
Awesome Threat Detection and Hunting 3,853 4 months ago A curated list of awesome threat detection and hunting resources
Awesome Container Security 14 over 5 years ago A curated list of awesome resources related to container building and runtime security
Awesome Crypto Papers 1,805 about 1 month ago A curated list of cryptography papers, articles, tutorials and howtos

Backlinks from these awesome lists:

More related projects: