# 更新软件包列表
sudo apt update && sudo apt upgrade -y # Debian/Ubuntu
sudo yum update -y # CentOS/RHEL
sudo dnf upgrade -y # Fedora
# 设置自动安全更新
sudo apt install unattended-upgrades # Debian/Ubuntu
sudo dpkg-reconfigure -plow unattended-upgrades
# 查看并禁用不必要的服务
systemctl list-unit-files --type=service | grep enabled
sudo systemctl disable <不需要的服务名>
# 卸载不必要的软件包
sudo apt purge <不需要的软件> # Debian/Ubuntu
sudo yum remove <不需要的软件> # CentOS/RHEL
# 编辑PAM配置文件
sudo vi /etc/pam.d/common-password # Debian/Ubuntu
sudo vi /etc/pam.d/system-auth # CentOS/RHEL
# 添加或修改以下参数(示例):
password requisite pam_pwquality.so retry=3 minlen=12 difok=3 ucredit=-1 lcredit=-1 dcredit=-1 ocredit=-1
sudo vi /etc/ssh/sshd_config
# 推荐修改项:
Port 2222 # 修改默认端口
PermitRootLogin no # 禁止root直接登录
MaxAuthTries 3 # 最大尝试次数
ClientAliveInterval 300 # 超时设置
Protocol 2 # 仅使用SSHv2
AllowUsers user1 user2 # 仅允许特定用户登录
# 重启SSH服务
sudo systemctl restart sshd
# UFW (Ubuntu)
sudo ufw enable
sudo ufw default deny incoming
sudo ufw default allow outgoing
sudo ufw allow 2222/tcp # 允许SSH新端口
# firewalld (CentOS/RHEL)
sudo systemctl enable firewalld
sudo systemctl start firewalld
sudo firewall-cmd --permanent --add-port=2222/tcp
sudo firewall-cmd --reload
# 禁用IP转发
sudo sysctl -w net.ipv4.ip_forward=0
echo "net.ipv4.ip_forward = 0" | sudo tee -a /etc/sysctl.conf
# 启用SYN Cookie保护
echo "net.ipv4.tcp_syncookies = 1" | sudo tee -a /etc/sysctl.conf
sudo sysctl -p
sudo chmod 600 /etc/shadow
sudo chmod 644 /etc/passwd
sudo chown root:root /etc/passwd
sudo chown root:shadow /etc/shadow
# 编辑/etc/fstab,添加以下选项:
/dev/sda1 / ext4 defaults,nodev,nosuid,noexec 1 1
/tmp /var/tmp none rw,noexec,nosuid,nodev,bind 0 0
# 安装和运行lynis审计工具
sudo apt install lynis # Debian/Ubuntu
sudo yum install lynis # CentOS/RHEL
sudo lynis audit system
# 使用OpenVAS或Nessus进行深度扫描
sudo apt list --upgradable
或 sudo yum list updates
apt changelog <package>
或访问NVD数据库bash
sudo apt install --only-upgrade <package> # Debian/Ubuntu
sudo yum update --cve <CVE-ID> # CentOS/RHEL
# 配置rsyslog集中管理
sudo vi /etc/rsyslog.conf
# 安装和配置auditd
sudo apt install auditd # Debian/Ubuntu
sudo yum install audit # CentOS/RHEL
sudo systemctl enable auditd
sudo auditctl -l # 查看当前规则
# 安装AIDE (高级入侵检测环境)
sudo apt install aide # Debian/Ubuntu
sudo yum install aide # CentOS/RHEL
sudo aideinit
sudo mv /var/lib/aide/aide.db.new /var/lib/aide/aide.db
每月任务:
每周任务:
每日任务:
通过以上步骤的系统性实施,可以显著提高Linux系统的安全性,减少被攻击的风险。请根据实际环境调整具体参数,并在生产环境实施前进行充分测试。