Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
We also use security blanket ...
And is on the approved software list
Which approved list? This has been an issue for us which has kept us from deploying this tool across all of our servers. I'm hoping it will show up on the DoD/USAF list soon!
Click here to see the post LQ members have rated as the most helpful post in this thread.
I realize this thread is over 4 years old, but this is one of the top results when searching for Linux STIGs. While nothing that I've found operates on a Debian-based system, there are some tools to configure a RHEL system and its derivatives like CentOS.
The closest thing I've found to what you're proposing in this thread (other than Security Blanket) is DoD Bastille which is an open source, rewritten version of Bastille Linux to configure a server to be in compliance with DISA STIGs.
You can find DoD Bastille on Forge.mil (the DISA version of SourceForge.net for DoD open source projects). You'll need to login with a DoD issued CAC card.
Here is the direct link to the DoD Bastille page: https://software.forge.mil/sf/projects/dodbastile
From what I can tell, it doesn't look like much has changed since Feb 2011, but it looks like a very promising solution if it can maintain active development.
Thanks for the info. That project is actually dead. We moved that project out into the open source community, renamed it, and actually started heavily development.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.