Centos + Ensim Web Server Hardening Question

Greetings fellow computer junkies,

Short and to the point,

In considering the application of the following " Hardening outline "
borrowed from our good friends at rack911.com/security.php,

is there A-n-y-t-h-i-n-g you can think of to add to the following list to
ensure Fort knox Security " + " easy of update managment.

( short of removing the nic cable Centos + Ensim Web Server Hardening Question

-v- Borroew Outline -v-

1 ) Limit compiler & fetch utilities access to root only.

2 ) Correct folder permissions to prevent directory transversal on unprivileged users.

3 ) Logwatch installation and configuration:
- Sends a detailed daily report of server events based on logs.

4 ) Host.conf & sysctl hardening:
- Basic spoof & dos protection.

5 ) Noexec, Nosuid temporary directory's:
- Directory's include /dev/shm, /var/tmp, /tmp prevents basic scripts from being executed.

6 ) Chkrootkit & RkHunter Installation:
- Checks for possible root kits on the server and sends you a daily report.

7 ) Installation and configuration of APF:
- Restricts access to unneeded ports.

8 ) Kernel update w/grsecurity.

9 ) Disable of dangerous php functions:
- Disabling of functions that could potentially cause harm to the server and/or its users.

10 ) BFD Installation:
- Checks for bruteforce attempts and automatically adds them to the firewall to block them.

11 ) NSIV Installation:
- Validates inodes against each LISTEN socket.

12) PRM Installation:
- Process Resource Monitor.

13) Update all server/control panel software.

14) Disabling Unused Services:
- Unused services are disabled which could be exploited, for example telnet.

15) Samhain Configuration:
- File integrity checking / host-based intrusion detection

16) Linux Socket Monitor:
- Monitors created sockets and compares against a database.

17 )Enforce LCAP limitations:
- Limits kernel capabilities.

18) Install and configure Mod_Security w/mildly aggressive ruleset:
- Used to prevent web attacks.

19) Email Virus Scanning Configuration:
- Setup some kind of email virus scanning depending on your MTA.

20) System Integrity monitor:
- Tracks downed services and attempts to restart them.

21) RPM Package Audit:
- Removal of unneeded rpm packages, which could sometimes bring a hole for exploitation.

22) Default User Audit:
- Removal of unneeded/unused default system users.

23) Default Group Audit:
- Removal of unneeded/unused default system groups.

24) Check/secure configuration defaults on common services.

25) Mod_dosevasive:
- Evasive maneuvers module for Apache to prevent dos type attacks on apache.

-^- Borroew Outline -^-

So once again, is there A-n-y-t-h-i-n-g you can think of to add to the following list to ensure Fort knox Security " + " easy of update managment.

Thanks everyone for taking the time to help.

Centos + Ensim Web Server Hardening Question

 

 

 

 

Top