作为IT工程师,我将为您提供一套全面的Linux服务器安全防护方案,帮助您有效预防和应对安全威胁。
sudo apt update && sudo apt upgrade
(Debian/Ubuntu) 或 sudo yum update
(RHEL/CentOS)bash
sudo apt install unattended-upgrades
sudo dpkg-reconfigure unattended-upgrades
sudo apt-get --no-install-recommends install package
sudo systemctl disable servicename
/etc/ssh/sshd_config
中PermitRootLogin no
visudo
配置合理的sudo权限/etc/login.defs
和/etc/pam.d/common-password
UFW (简单防火墙):
sudo ufw enable
sudo ufw default deny incoming
sudo ufw default allow outgoing
sudo ufw allow 22/tcp # 仅允许SSH
IPTables (高级配置):
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT
sudo iptables -A INPUT -j DROP
Port 2222
(在sshd_config中)bash
PubkeyAuthentication yes
PasswordAuthentication no
bash
sudo apt install fail2ban
sudo systemctl enable fail2ban
sudo tail -f /var/log/auth.log
(查看认证日志)bash
sudo apt install aide
sudo aideinit
sudo aide --check
bash
sudo apt install clamav clamav-daemon
sudo freshclam # 更新病毒库
sudo clamscan -r / # 全盘扫描
SELinux (RHEL/CentOS):
sudo setenforce 1 # 启用强制模式
sudo semanage port -a -t ssh_port_t -p tcp 2222 # 自定义端口
AppArmor (Debian/Ubuntu):
sudo aa-enforce /etc/apparmor.d/*
/etc/sysctl.conf
:
net.ipv4.conf.all.rp_filter=1
net.ipv4.conf.default.rp_filter=1
net.ipv4.tcp_syncookies=1
bash
sudo dockerd --userns-remap=default # 用户命名空间
sudo docker run --read-only # 只读容器
使用Lynis进行安全审计:
sudo apt install lynis
sudo lynis audit system
OpenSCAP合规性检查:
sudo apt install openscap-scanner
sudo oscap xccdf eval --profile standard /usr/share/xml/scap/ssg/content/ssg-ubuntu1804-ds.xml
通过实施以上措施,您的Linux服务器将具备强大的安全防护能力。请记住,安全是一个持续的过程,需要定期审查和更新防护策略。