|
4 | 4 |
|
5 | 5 | Hardened Debian GNU/Linux and CentOS 8 distro auditing. |
6 | 6 |
|
7 | | -The main test environment is in debian GNU/Linux 9/10/11/12 and CentOS 8 and ubuntu 22, and other versions are not fully tested. There are no implementations of desktop related items in this release. |
| 7 | +The main test environment is in debian GNU/Linux 9/10/11/12/13 and CentOS 8 and ubuntu 22, and other versions are not fully tested. There are no implementations of desktop related items in this release. |
8 | 8 |
|
9 | | -The code framework is based on the [OVH-debian-cis](https://github.com/ovh/debian-cis) project, Modified some of the original implementations according to the features of Debian 9/10/11/12 and CentOS 8, added and implemented check items for [STIG Red_Hat_Enterprise_Linux_7_V2R5](https://github.com/hardenedlinux/STIG-OS-mirror/blob/master/redhat-STIG-DOCs/U_Red_Hat_Enterprise_Linux_7_V2R5_STIG.zip) [STIG Ubuntu V1R2](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Canonical_Ubuntu_16-04_LTS_V1R2_STIG.zip) and [cisecurity.org](https://www.cisecurity.org/) recommendations, and also added and implemented some check items by the HardenedLinux community. The audit and apply functions of the infrastructure are implemented, and the automatic fix function is implemented for the items that can be automatically fixed. |
| 9 | +The code framework is based on the [OVH-debian-cis](https://github.com/ovh/debian-cis) project, Modified some of the original implementations according to the features of Debian 9/10/11/12/13 and CentOS 8, added and implemented check items for [STIG Red_Hat_Enterprise_Linux_7_V2R5](https://github.com/hardenedlinux/STIG-OS-mirror/blob/master/redhat-STIG-DOCs/U_Red_Hat_Enterprise_Linux_7_V2R5_STIG.zip) [STIG Ubuntu V1R2](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Canonical_Ubuntu_16-04_LTS_V1R2_STIG.zip) and [cisecurity.org](https://www.cisecurity.org/) recommendations, and also added and implemented some check items by the HardenedLinux community. The audit and apply functions of the infrastructure are implemented, and the automatic fix function is implemented for the items that can be automatically fixed. |
10 | 10 |
|
11 | 11 |
|
12 | 12 | ```console |
@@ -47,12 +47,12 @@ hardening [INFO] Treating /home/test/harbian-audit/bin/hardening |
47 | 47 | 1.1_install_updates [ OK ] Check Passed |
48 | 48 | [...] |
49 | 49 | ################### SUMMARY ################### |
50 | | - Total Available Checks : 270 |
51 | | - Total Runned Checks : 270 |
52 | | - Total Passed Checks : [ 226/270 ] |
53 | | - Total Failed Checks : [ 44/270 ] |
| 50 | + Total Available Checks : 284 |
| 51 | + Total Runned Checks : 284 |
| 52 | + Total Passed Checks : [ 260/284 ] |
| 53 | + Total Failed Checks : [ 24/284 ] |
54 | 54 | Enabled Checks Percentage : 100.00 % |
55 | | - Conformity Percentage : 83.70 % |
| 55 | + Conformity Percentage : 91.55 % |
56 | 56 | # bin/hardening.sh --set-hardening-level 5 |
57 | 57 | # bin/hardening.sh --apply |
58 | 58 | hardening [INFO] Treating /home/test/harbian-audit/bin/hardening/1.1_install_updates.sh |
@@ -181,7 +181,7 @@ Set the corresponding firewall rules according to the applications used. Hardene |
181 | 181 |
|
182 | 182 | ### Iptabels format rules: |
183 | 183 | [etc.iptables.rules.v4.sh](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/etc.iptables.rules.v4.sh) |
184 | | -to do the following: |
| 184 | +First install the iptables-persistent package, then to do the following: |
185 | 185 | ``` |
186 | 186 | $ INTERFACENAME="your network interfacename(Example eth0)" |
187 | 187 | # bash docs/configurations/etc.iptables.rules.v4.sh $INTERFACENAME |
|
0 commit comments