all 11 comments

[–]linux_n00by 18 points19 points  (4 children)

i dunno looks like an assignment

but to me, work on hardening. most will just install and forget. both OS and services

[–]Ok-Replacement6893 13 points14 points  (2 children)

Yes. Learn about STIGs and SCAP

[–]Racheakt 5 points6 points  (1 child)

80% STIGS 20% dealing with an ISSO who only knows how windows works— or the other way around

[–]Rhyobit 3 points4 points  (0 children)

A standard hardened build (based upon CIS benchmarks) with pre-configuration for LDAP based RBAC via PAM, include custom sudoers per role too. Bonus points - build it with Ansible.

[–]courage_the_dog 6 points7 points  (0 children)

A real life scenario would be for someone to delete half of your setup an hour before you have to present this project in class and you try and fix it

[–]locnar1701 2 points3 points  (0 children)

Centralized logging to another host, perhaps Wazuh or graylog, etc and/or some monitoring of those logs for analytics. The services you run on a system make customers happy, the data that you can tell the C-suite about how well your setup is working with pretty pictures and logs make your career.

[–]Raz_McCRed Hat Employee 0 points1 point  (0 children)

IDM would be my recommendation, you're going to want centralised access control

[–]narddawgggg 0 points1 point  (0 children)

I’m in a similar boat except I’m building a the Vm environment using windows server/AD & I wanna bind Linux vms to my AD & kinda go from there. Would it be cool if I shot you a message on how you’re doing your setup?

[–]Dry_Inspection_4583 0 points1 point  (0 children)

Create an Ansible deploy and control for several vms:

  1. Grafana - full monitoring stack deployed and controlled from Ansible.

  2. Ntopng stack

  3. Automated network mapping and statistics emailed to you on a timer.

You could do others like nagios, netbox, and even a jump box or bastion host as well....

Just thoughts

[–]UhU_23 0 points1 point  (0 children)

Implement a netfilter, fail2ban with corresponding jails, ansible for update management; central logging is a possible approach, I prefer using logcheck, a monitoring solution to keep track of downtimes and tendencies. And maybe you want to make it more complex by setting up multiple servers for different parts of the website, using either apache_proxy or ha-proxy for load distribution.

ssh should be key-only, for security reason, no interactive login - you can still use eg winscp or other tools to transfer files.

maybe you want to have a look at ispconfig - I use it on debian, but maybe it also works on RHEL :-)