VA Remediation
VA Remediation
VA Remediation
---- it monitors unauthorised access to file usage. only owner and group can use it
---
auditctl -w /bin/sudo -p a -k privileged
/tmp
# systemctl unmask tmp.mount
# systemctl enable tmp.mount
# yum install aide
# sed -i 's/gpgcheck=0/gpgcheck=1/g' /etc/yum.repos.d/dev-source.repo
# sed -i 's/SELINUX=permissive/SELINUX=enforcing/g' /etc/selinux/config
export http_proxy="http://10.1.224.244:8080";export
https_proxy="http://10.1.224.244:8080"
tcpdump.x86_64 14:4.9.2-4.0.1.el7_7.1
cp issue.net issue
chmod 664 issue
umask
rm /etc/cron.deny
rm /etc/at.deny
touch /etc/cron.allow
touch /etc/at.allow
chmod og-rwx /etc/cron.allow
chmod og-rwx /etc/at.allow
chown root:root /etc/cron.allow
chown root:root /etc/at.allow
usermod -f 35 user
rolemod -f 35 user
######### ciphers|kexalgorithms
MACS hmac-sha2-512,hmac-sha2-256
ciphers aes128-ctr,aes192-ctr,aes256-ctr
dragon@user123
$1$xyz$LqLzaMtt74CpnSBWR4wqz1
or
openssl passwd -1 -salt xyz
>your password
GR3AtY3aR$15
find ./ -name syslog - arcsight
auditreduce -c lo | praudit -s
openssl ciphers
Solution: Disable use of 3DES cipher suites. See Securing AMD for details.
nginx:
Add the following to your nginx.conf
Code:
add_header X-Frame-Options SAMEORIGIN;
add_header X-XSS-Protection "1; mode=block";
add_header X-Content-Type-Options nosniff;
In your configuration file(s), find the entry "SSLProtocol" and modify it to look
like:
SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
This tells Apache to enable all protocols, but disable SSLv2, SSLv3, TLS 1.0 and
TLS 1.1. The last step is to restart the Apache service:
# vi /etc/sysctl.conf
fs.suid_dumpable = 0
kernel.randomize_va_space = 2
net.ipv4.ip_forward = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.all.accept_source_route = 0
net.ipv4.conf.default.accept_source_route = 0
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.secure_redirects = 0
net.ipv4.conf.default.secure_redirects = 0
net.ipv4.conf.all.log_martians = 1
net.ipv4.conf.default.log_martians = 1
net.ipv4.icmp_echo_ignore_broadcasts = 1
net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv6.conf.all.accept_ra = 0
net.ipv6.conf.default.accept_ra = 0
net.ipv6.conf.all.accept_redirects = 0
net.ipv6.conf.default.accept_redirects = 0
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
net.ipv4.conf.default.accept_redirects=0
----
ChallengeResponseAuthentication no
KbdInteractiveAuthentication no
/home - 200G
/usr - 100G
swap - 30G
/export/patrol - 10
/crashdump - 100
/export/home - 100
/opt - 100
/boot -2
/export/ctma - 5
/var - 100
/var/log 100
/var/log/audit - 50
/ - 100G
biosboot - 1MiB
Welcome2december2020!