知识库

标准化实施手册及常见错误


Linux系统安全基线手册

<p>[linux系统安全基线设置原件.docx](<a href="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/53a935b0e004a7aa4f7f3768205398e4">http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/53a935b0e004a7aa4f7f3768205398e4</a> &quot;[linux系统安全基线设置.docx&quot;)</p> <h3>1.Linux安全基线概述</h3> <h4>1.1.安全基线概念</h4> <p>安全基线概念 安全基线是指满足最小安全保证的基本要求、环境配置。</p> <h4>1.2.文档编制目的</h4> <p>本文档针对安装运行 Linux 系列操作系统的计算机主机所应当 遵循的基本安全设置要求提供了参考建议,用于 Linux 操作系统过程中进行安全配置合规性自查、检查、加固提 供标准依据与操作指导。</p> <h4>1.3.文档适用范围</h4> <p>本文档适用于 Linux 系列操作系统的各类版本,部分操作系统 或版本的特定配置与操作见括号内说明。文档使用人员包括系统管 理员及终端计算机用户。</p> <h3>2.账号管理、认证授权</h3> <h4>2.1.账号</h4> <h5>2.1.1.用户口令设置</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/0c4aa9b569e8bca07d59ce33996a8c46" alt="" /></p> <h5>2.1.2.root用户远程登录限制</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/0aaaa04c80c7b7453a9e409b3b2003fb" alt="" /></p> <h5>2.1.3.检查是否存在除root之外UID为0的用户</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/aed2bf8675bc6591c83982b94fa4fc49" alt="" /></p> <h5>2.1.4.root用户环境变量的安全性</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/3fc8a1646195f8751cf7c28ed9694f75" alt="" /></p> <h4>2.2.认证</h4> <h5>2.2.1.远程连接的安全性配置</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/f4fce48f0bb7dde40329ee9315c64804" alt="" /></p> <h5>2.2.2.用户的umask 安全配置</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/c20b2c8b4c7ac078dd466e83fa1db1fd" alt="" /></p> <h5>2.2.3.重要目录和文件的权限设置</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/b742620b73fa76c9069a92cacfce5b93" alt="" /></p> <h5>2.2.4.查找未授权的SUID/SGID 文件</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/eccbe4a06ac728c539d0f668caadcc30" alt="" /></p> <h5>2.2.5.检查任何人都有写权限的目录</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/076faa7509dc44fc090fe23b9c6b88be" alt="" /></p> <h5>2.2.6.查找任何人都有写权限的文件</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/ed632c3cc2781c6c299c2cc8a92ee20c" alt="" /></p> <h5>2.2.7.检查没有属主的文件</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/fef23b62a2b8ea057ce29f632edae44c" alt="" /></p> <h5>2.2.8.检查异常隐含文件</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/93e8a28dd4de1ec055b49860aab17966" alt="" /></p> <h3>3.日志审计</h3> <h4>3.1.日志</h4> <h5>3.1.1.syslog登录事件记录</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/b6f35034f29da841a0004b9faede1d28" alt="" /></p> <h4>3.2.审计</h4> <h5>3.2.1.Syslog.conf的配置审核</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/9d49b13607c83dc442e936b0c5ef693b" alt="" /></p> <h3>4.系统文件</h3> <h4>4.1.系统状态</h4> <h5>4.1.1.系统core dump状态</h5> <p><img src="http://60.191.64.5:16100/server/index.php?s=/api/attachment/visitFile/sign/95915739fe3cb1436c3e726942a867b6" alt="" /></p>

页面列表

ITEM_HTML