The Map of Linux/Open Source based Hardened Infrastructure.
Leszek Mi?
Cyber Security Threat Analyst | Security Architect | Trainer | Founder @ Defensive Security (OSCP|RHCA|RHCSS|Sec+|Splunk Architect)
Penetration testers like using mind maps and other brainstorming stuff which help them conducting high quality offensive security services.
We *defenders/administrators/*ops/architects also should do our duties in this way! We should definitely start doing our job more precisly, reliable and with more attention to details, because the devil is in details. Simple old-schooled Linux hardening with suid bits erased is no more a case.
Today, correct protection against network and system level exploitation depends on:
- how many protection layers you actually deployed for your core instances.
- how well your systems are configured, hardened, isolated and manag,
- how well your network traffic is monitored and analyzed as well as low level service's syscall lifecycle,
- and a lot more...
Because the overall complexity of OS software security is more and more sophisticated, I have prepared a map to systematize it. I hope you will find it as a valuable tip. Check out the map here: https://defensive-security.com/content/images/2016/01/Open_Source_Defensive_Securitydefensive-security_com.png
Your comments are most welcome.
Backend Software Engineer at bullfinch
6 年I can not view it.
Head Of Innovation at eKRAAL Innovation Hub, Director AfricaHackOn
6 年Pretty good
Cyber Security Threat Analyst | Security Architect | Trainer | Founder @ Defensive Security (OSCP|RHCA|RHCSS|Sec+|Splunk Architect)
7 年The map is back. Sorry for the inconvenience.
Backend Software Engineer at bullfinch
7 年I can not see the map.