RHEL7-CIS
System hardener
Automates hardening of RHEL 7 systems to meet CIS compliance requirements
Ansible RHEL 7 - CIS Benchmark Hardening Script
30 stars
7 watching
40 forks
Language: Shell
last commit: over 4 years ago
Linked from 1 awesome list
ansibleansible-galaxyansible-playbookansible-playbooksansible-roleansible-rolesautomationcentoscentos7centos7-ciscis-benchmarkhardenrhelrhel7rhel7-cissecurity-hardeningsystem-hardening
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides modular security hardening scripts for Debian distributions based on CIS security standards | 781 |
| A collection of tools to harden and audit a CentOS 7 Linux distribution against the CIS benchmark | 73 |
| Automates Linux hardening to conform to Center for Internet Security Benchmark standards | 9 |
| Installs and configures the EPEL repository for RHEL/CentOS-based systems | 186 |
| Tool to check system compliance against published security benchmarks | 249 |
| Automates UNIX/Linux system hardening and security configuration | 415 |
| An Ansible role to apply a security baseline on Linux servers. | 543 |
| A tool for automating security audits of Docker environments | 490 |
| A minimal Linux kernel hardening project | 574 |
| Automates server security hardening on initial login as root | 94 |
| A script to harden a Ubuntu server for security | 1,394 |
| Tools for analyzing and hardening the security of Linux kernels | 1,711 |
| A tool for configuring and securing Windows systems according to security guidelines and standards | 2,375 |
| An Ansible role for installing and configuring Cobalt Strike | 74 |
| A toolset for validating hardware security requirements on x86 platforms | 47 |