Differences between revisions 49 and 50
Revision 49 as of 2019-09-07 11:47:11
Size: 4518
Editor: nodiscc
Comment: WIP move info from SecurityChecklist
Revision 50 as of 2019-09-11 02:34:39
Size: 4506
Editor: PaulWise
Comment: use interwiki for wikipedia, https
Deletions are marked like this. Additions are marked like this.
Line 8: Line 8:
||<tablestyle="width: 100%; text-align: center; border: 0px hidden"> {{http://www.debian.org/logos/openlogo-nd-50.png}} {{http://www.debian.org/Pics/debian.png}}|| ||<tablestyle="width: 100%; text-align: center; border: 0px hidden"> {{https://www.debian.org/logos/openlogo-nd-50.png}} {{https://www.debian.org/Pics/debian.png}}||
Line 16: Line 16:
http://www.debian.org/doc/manuals/securing-debian-howto/ - ''Securing Debian'' Manual <<BR>>
http://www.debian.org/security/ - Information about Debian Security
https://www.debian.org/doc/manuals/securing-debian-howto/ - ''Securing Debian'' Manual <<BR>>
https://www.debian.org/security/ - Information about Debian Security
Line 20: Line 20:
 . '''[[https://en.wikipedia.org/wiki/Computer_security|Computer security]]''', cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet, wireless networks, the growth of "smart"/"Internet of things" devices.  . '''[[WikiPedia:Computer_security|Computer security]]''', cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet, wireless networks, the growth of "smart"/"Internet of things" devices.
Line 33: Line 33:
The '''[[http://www.debian.org/doc/manuals/securing-debian-howto/|Securing Debian manual]]''' describes security in Debian, securing and hardening the default Debian GNU/Linux installation, common tasks to set up a secure network environment, and additional information on available security tools. The '''[[https://www.debian.org/doc/manuals/securing-debian-howto/|Securing Debian manual]]''' describes security in Debian, securing and hardening the default Debian GNU/Linux installation, common tasks to set up a secure network environment, and additional information on available security tools.
Line 41: Line 41:
 * Read the [[http://www.debian.org/doc/manuals/securing-debian-howto/|Securing Debian manual]]
 * Subscribe to the [[http://lists.debian.org/debian-security-announce/|debian-security-announce]] mailing list for information on security advisories, and/or the higher traffic [[http://lists.debian.org/debian-security/|debian-security]] list.
 * Read the [[https://www.debian.org/doc/manuals/securing-debian-howto/|Securing Debian manual]]
 * Subscribe to the [[https://lists.debian.org/debian-security-announce/|debian-security-announce]] mailing list for information on security advisories, and/or the higher traffic [[https://lists.debian.org/debian-security/|debian-security]] list.

Translation(s): English - Français - Italiano



https://www.debian.org/logos/openlogo-nd-50.png https://www.debian.org/Pics/debian.png

Portal/IDB/logo_portal.png Welcome to Debian security management


Portal/IDB/icon-security-32x32.png This portal talk about managing security on your system. Technical language could be used.

https://www.debian.org/doc/manuals/securing-debian-howto/ - Securing Debian Manual
https://www.debian.org/security/ - Information about Debian Security

  • Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet, wireless networks, the growth of "smart"/"Internet of things" devices.

Some common principles of computer security include:

  • Threat models: Some will only want to prevent access to their computer/account when leaving it a few minutes to make coffee - this is simply dealt with (installing a screen locker). Some may want to stop sophisticated gangs from breaking into their systems - this requires a whole shift in thinking so that everything you do has security in mind.

  • Defense in depth: building layer upon layer of security measures - hence not only relying on one layer of security, but many different measures which would all have to be circumvented in order to compromise the system.

  • A weakest link is any component in a system, that will cause the whole security strategy to fail if defeated.

  • Security is a process, not a product: just buying or setting up a technology solution will not provide you security on its own - security is an ongoing technological and human process.


The Securing Debian manual describes security in Debian, securing and hardening the default Debian GNU/Linux installation, common tasks to set up a secure network environment, and additional information on available security tools.


Security checklist

This covers only some aspects of securing a system:

  • Read the Securing Debian manual

  • Subscribe to the debian-security-announce mailing list for information on security advisories, and/or the higher traffic debian-security list.

  • Only ?PackageManagement software from trusted sources. Use SecureApt to validate package signatures. Minimize installed software.

  • Minimize running software - check for running processes that you do net need (ps, top, , monitoring systems...), minimize running services

  • Use a ?Firewall to restrict network access to and from your system. Close any ports that you do not need open. check for unwanted open ports/services (ss, netstat...). Disable networking in applications that do not need it.

  • Use strong Cryptography (encrypted network protocols)

RAID

List of pages related to RAID (Redundant Array of Inexpensive Disks):

User management

List of pages related to user account management on Debian:

Backup and Restore

List of pages related to backing up a Debian system:

Wiki pages

List of pages related to security management in Debian:


CategoryPortal | CategorySystemAdministration | CategorySystemSecurity | CategoryNetwork