The Map of Linux/Open Source based Hardened Infrastructure.

The Map of Linux/Open Source based Hardened Infrastructure.

Penetration testers like using mind maps and other brainstorming stuff which help them conducting high quality offensive security services. 

We *defenders/administrators/*ops/architects also should do our duties in this way! We should definitely start doing our job more precisly, reliable and with more attention to details, because the devil is in details. Simple old-schooled Linux hardening with suid bits erased is no more a case.

Today, correct protection against network and system level exploitation depends on:

  • how many protection layers you actually deployed for your core instances.
  • how well your systems are configured, hardened, isolated and manag,
  • how well your network traffic is monitored and analyzed as well as low level service's syscall lifecycle,
  • and a lot more...

Because the overall complexity of OS software security is more and more sophisticated, I have prepared a map to systematize it. I hope you will find it as a valuable tip. Check out the map here: https://defensive-security.com/content/images/2016/01/Open_Source_Defensive_Securitydefensive-security_com.png


Your comments are most welcome.

José ángel Rodríguez Rodrigo

Backend Software Engineer at bullfinch

6 年

I can not view it.

Samuel Mwai

Head Of Innovation at eKRAAL Innovation Hub, Director AfricaHackOn

6 年

Pretty good

回复
Leszek Mi?

Cyber Security Threat Analyst | Security Architect | Trainer | Founder @ Defensive Security (OSCP|RHCA|RHCSS|Sec+|Splunk Architect)

7 年

The map is back. Sorry for the inconvenience.

回复
José ángel Rodríguez Rodrigo

Backend Software Engineer at bullfinch

7 年

I can not see the map.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了