安全部署防御维度都有哪些
CentOS 系统安全配置的主要意图是构建一个防御性架构,通过多层次防护措施降低系统被攻击的风险,确保数据和服务的安全性、完整性和可用性。具体意图可分为以下核心方面:
avahi-daemon
、cups
)fail2ban
)/etc/passwd
只读)umask
默认值auditd
)记录关键操作fail2ban
防暴力破解rkhunter
、chkrootkit
)/etc/shadow
的修改)lynis
自动化检查)yum-cron
)cron
调度)ℹ️ 注意:安全配置需平衡安全性与可用性。过度限制可能导致服务异常,建议在生产环境部署前进行充分测试。
sudo yum update -y
sudo yum upgrade -y
sudo yum install yum-cron -y
sudo systemctl enable yum-cron
sudo systemctl start yum-cron
配置 /etc/yum/yum-cron.conf
设置自动更新策略
sudo vi /etc/login.defs
修改以下参数:
PASS_MAX_DAYS 90
PASS_MIN_DAYS 7
PASS_MIN_LEN 12
PASS_WARN_AGE 14
sudo yum install libpwquality -y
sudo vi /etc/security/pwquality.conf
添加/修改:
minlen = 12
dcredit = -1
ucredit = -1
ocredit = -1
lcredit = -1
sudo vi /etc/ssh/sshd_config
修改:
PermitRootLogin no
sudo vi /etc/ssh/sshd_config
修改:
Port 2222 # 改为非标准端口
PubkeyAuthentication yes
PasswordAuthentication no
AllowUsers user@192.168.1.*
ClientAliveInterval 300
ClientAliveCountMax 0
sudo systemctl restart sshd
sudo systemctl enable firewalld
sudo systemctl start firewalld
sudo firewall-cmd --permanent --add-service=ssh
sudo firewall-cmd --permanent --add-port=2222/tcp # 如果修改了SSH端口
sudo firewall-cmd --reload
sudo firewall-cmd --permanent --add-icmp-block=echo-reply
sudo firewall-cmd --permanent --add-icmp-block=echo-request
sestatus
sudo vi /etc/selinux/config
确保:
SELINUX=enforcing
sudo chmod 700 /boot /usr/src /lib/modules /etc/sysconfig/network-scripts
sudo chmod 750 /var/log
sudo vi /etc/profile
添加:
umask 027
find / -perm /4000 -type f -exec ls -la {} \; 2>/dev/null
find / -perm /2000 -type f -exec ls -la {} \; 2>/dev/null
sudo systemctl disable avahi-daemon cups bluetooth
sudo systemctl stop avahi-daemon cups bluetooth
sudo netstat -tulnp
sudo ss -tulnp
sudo yum install audit -y
sudo systemctl enable auditd
sudo systemctl start auditd
sudo vi /etc/audit/audit.rules
添加:
-w /etc/passwd -p wa -k identity
-w /etc/group -p wa -k identity
-w /etc/shadow -p wa -k identity
sudo yum install epel-release -y
sudo yum install fail2ban -y
sudo systemctl enable fail2ban
sudo systemctl start fail2ban
sudo vi /etc/sysctl.conf
添加:
net.ipv4.conf.all.rp_filter=1
net.ipv4.conf.default.rp_filter=1
net.ipv4.icmp_echo_ignore_broadcasts=1
net.ipv4.conf.all.accept_redirects=0
net.ipv6.conf.all.accept_redirects=0
net.ipv4.tcp_syncookies=1
kernel.exec-shield=1
kernel.randomize_va_space=2
sudo sysctl -p
sudo yum install rkhunter chkrootkit lynis -y
sudo rkhunter --check
sudo chkrootkit
sudo lynis audit system
sudo crontab -e
添加:
0 3 * * * /usr/bin/rkhunter --check --cronjob
通过以上全面的安全配置,可以显著提高CentOS系统的安全性。根据实际环境需求,可能需要调整某些配置项。建议在实施前在测试环境验证,并确保有完整的备份和回滚方案。