How to do CentOS Stream 8 security settings
CentOS Stream 8 Security Reinforcement Guide: Key Steps to Improve System Security
This article outlines the key steps to enhance the security of CentOS Stream 8 systems, aiming to build a safer operating environment. These security measures cover account management, system services, network security, and system maintenance.
Account security and permission control
-
Disable redundant superuser accounts:
- Identify the account with root privileges: Use
cat /etc/passwd | awk -F ':' '{print$1,$3}' | grep '0$'
command. - Backup and lock/unlock the account: Back up the
/etc/passwd
file (cp -p /etc/passwd /etc/passwd_bak
), and then usepasswd -l
to lock orpasswd -u
to unlock the account. - Delete unnecessary accounts: for example
adm
,lp
,sync
, etc., useuserdel username
andgroupdel groupname
commands to delete users and groups.
- Identify the account with root privileges: Use
-
Strengthen password policy:
- Forced use of complex passwords: Passwords should contain uppercase letters, lowercase letters, numbers and special characters, with a length of at least 10 digits.
- Modify the
/etc/login.defs
file and set the minimum password length:PASS_MIN_LEN 10
. - Check and process empty password account: Use
awk -F ":" '(NF==1) {print $1}' /etc/shadow
command to find the empty password account and modify it immediately.
-
Protect password file:
- Use
chattr i
command to set unmodified properties for/etc/passwd
,/etc/shadow
,/etc/group
, and/etc/gshadow
files to enhance security.
- Use
System service management
-
Disable non-essential services:
- Stop and disable unnecessary system services, such as
acpid
,autofs
,bluetooth
,cpuspeed
,cups
,ip6tables
, etc.
- Stop and disable unnecessary system services, such as
-
Restrict service startup permissions:
- Set permissions for all files in the
/etc/rc.d/init.d/
directory to ensure that only root users can manage these services.
- Set permissions for all files in the
Network security settings
-
Network access control:
- Edit
/etc/exports
files and configure the strictest NFS shared access permissions. - The
/etc/securetty
file restricts the root user to log in only at the specified terminal.
- Edit
-
Defense against IP spoofing and DoS attacks:
- Configure
/etc/hosts.allow
and/etc/hosts.deny
files to enhance control over network access to protect against IP spoofing attacks. - Set system resource limits, such as maximum number of processes and memory usage, to prevent DoS attacks.
- Configure
System update and maintenance
-
Regularly update the system:
- Use the
dnf update
command to regularly update the system packages to ensure that the system is in the latest security state. - Enable automatic update function: Install
dnf-automatic
package and configure automatic download and installation of security updates.
- Use the
Following the above steps can significantly improve the security of CentOS Stream 8 systems. To continuously maintain system security, it is recommended to regularly review and update security configurations to deal with evolving security threats.
The above is the detailed content of How to do CentOS Stream 8 security settings. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Steps to configure IP address in CentOS: View the current network configuration: ip addr Edit the network configuration file: sudo vi /etc/sysconfig/network-scripts/ifcfg-eth0 Change IP address: Edit IPADDR= Line changes the subnet mask and gateway (optional): Edit NETMASK= and GATEWAY= Lines Restart the network service: sudo systemctl restart network verification IP address: ip addr

Improve HDFS performance on CentOS: A comprehensive optimization guide to optimize HDFS (Hadoop distributed file system) on CentOS requires comprehensive consideration of hardware, system configuration and network settings. This article provides a series of optimization strategies to help you improve HDFS performance. 1. Hardware upgrade and selection resource expansion: Increase the CPU, memory and storage capacity of the server as much as possible. High-performance hardware: adopts high-performance network cards and switches to improve network throughput. 2. System configuration fine-tuning kernel parameter adjustment: Modify /etc/sysctl.conf file to optimize kernel parameters such as TCP connection number, file handle number and memory management. For example, adjust TCP connection status and buffer size

The key differences between CentOS and Ubuntu are: origin (CentOS originates from Red Hat, for enterprises; Ubuntu originates from Debian, for individuals), package management (CentOS uses yum, focusing on stability; Ubuntu uses apt, for high update frequency), support cycle (CentOS provides 10 years of support, Ubuntu provides 5 years of LTS support), community support (CentOS focuses on stability, Ubuntu provides a wide range of tutorials and documents), uses (CentOS is biased towards servers, Ubuntu is suitable for servers and desktops), other differences include installation simplicity (CentOS is thin)

The CentOS shutdown command is shutdown, and the syntax is shutdown [Options] Time [Information]. Options include: -h Stop the system immediately; -P Turn off the power after shutdown; -r restart; -t Waiting time. Times can be specified as immediate (now), minutes ( minutes), or a specific time (hh:mm). Added information can be displayed in system messages.

CentOS will be shut down in 2024 because its upstream distribution, RHEL 8, has been shut down. This shutdown will affect the CentOS 8 system, preventing it from continuing to receive updates. Users should plan for migration, and recommended options include CentOS Stream, AlmaLinux, and Rocky Linux to keep the system safe and stable.

CentOS installation steps: Download the ISO image and burn bootable media; boot and select the installation source; select the language and keyboard layout; configure the network; partition the hard disk; set the system clock; create the root user; select the software package; start the installation; restart and boot from the hard disk after the installation is completed.

Backup and Recovery Policy of GitLab under CentOS System In order to ensure data security and recoverability, GitLab on CentOS provides a variety of backup methods. This article will introduce several common backup methods, configuration parameters and recovery processes in detail to help you establish a complete GitLab backup and recovery strategy. 1. Manual backup Use the gitlab-rakegitlab:backup:create command to execute manual backup. This command backs up key information such as GitLab repository, database, users, user groups, keys, and permissions. The default backup file is stored in the /var/opt/gitlab/backups directory. You can modify /etc/gitlab

CentOS Platform Hadoop Distributed File System (HDFS) Performance Optimization Guide Optimizing HDFS Performance is a multi-faceted issue, and multiple parameters need to be adjusted for specific situations. The following are some key optimization strategies: 1. Memory management adjusts the NameNode and DataNode memory configuration: reasonably configure the HADOOP_NAMENODE_OPTS and HADOOP_DATANODE_OPTS environment variables according to the actual memory size of the server to optimize memory utilization. Enable large page memory: For high memory consumption applications (such as HDFS), enabling large page memory can reduce memory page allocation and management overhead and improve efficiency. 2. Disk I/O optimization uses high-speed storage
