Introduction
SSH supports authenticating users with keys. Although they require more setup ahead of time, they're generally more secure than typing in passwords. They're also...
Introduction
Apparmor is an LSM (Linux Security Module) that allows us to restrict applications' capabilities with per-program profiles. It supplements the traditional Unix Discretionary Access...
This is another Kubernetes-related notebook entry in which I will document the procedure for setting up a Kubernetes cluster using K3S in virtual machines created with...
This post is about Hardening SSH Configuration
Introduction
SSH has become the standard tool for remote management of UNIX-based systems. The SSH daemon (sshd) is installed...
This post is about Security Auditing with Lynis
Introduction
I originally intended to write about how to secure a server/workstation system. However, I changed my mind...