-
-
Notifications
You must be signed in to change notification settings - Fork 7.7k
Check points for securing Home Assistant installations #1151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Really love this! Good first post and it can be expanded on further in the future.
@@ -27,6 +27,7 @@ <h1 class="title delta">Getting Started Guide</h1> | |||
<li>{% active_link /getting-started/customizing-devices/ Customizing devices and services %}</li> | |||
<li>{% active_link /getting-started/presence-detection/ Presence Detection %}</li> | |||
<li>{% active_link /getting-started/troubleshooting-configuration/ Troubleshooting %}</li> | |||
<li>{% active_link /getting-started/securing/ Security Check Points %}</li> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't list be in alphabetical order?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From my point of view, this is something for the end. It's not required but should be mentioned.
- Secure your host. Sources could be [Red Hat Enterprise Linux 7 Security Guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Security_Guide/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf), [CIS Red Hat Enterprise Linux 7 Benchmark](https://benchmarks.cisecurity.org/tools2/linux/CIS_Red_Hat_Enterprise_Linux_7_Benchmark_v1.0.0.pdf), or the [Securing Debian Manual](https://www.debian.org/doc/manuals/securing-debian-howto/index.en.html). | ||
- Restrict network access to your device. Set `PermitRootLogin no` and to use keys for authentication instead of passwords. | ||
- Restrict network access to your device. Set `PermitRootLogin no` in your sshd config (usually `/etc/ssh/sshd_config`) and to use keys for authentication instead of passwords. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This setting will only disallow login with root over ssh.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, this would be most likely already be covered by the first point but better mention this twice as the hardening guides are pretty extensive.
…t#1151) * Add check points * Add check points * Fix link * Grammar and style fixes
Just started to collect some points to keep a Home Assistant installation secure.