Security and Hardening
This step-by-step guide on Debian Security covers security tasks and best practices for Debian 12 LTS.
less than a minute
This Document is actively being developed as a part of ongoing Debian learning efforts. Chapters will be added periodically.
Debian: Security and Hardening
- How to Configure UFW Firewall Rules in Debian 12 Bookworm
- How to Enable and Configure AppArmor on Debian 12 Bookworm
- How to Harden SSH Security in Debian 12 Bookworm
- How to Disable Root Login Over SSH in Debian 12 Bookworm
- How to Restrict SSH Access by IP Address in Debian 12 Bookworm
- How to Set Up Automatic Log Monitoring for Security in Debian 12 Bookworm
- How to Check for Rootkits and Malware in Debian 12 Bookworm
- How to Disable USB Ports for Security in Debian 12 Bookworm
- How to Encrypt an Entire Debian System Using LUKS on Debian 12 Bookworm
- How to Securely Delete Files in Debian 12 Bookworm System
- How to Use chroot for Secure Application Execution in Debian 12 Bookworm
- How to Scan a Debian System for Vulnerabilities on Debian 12 Bookworm
- How to Use firewalld for Enhanced Security in Debian 12 Bookworm
- How to Set Up Multi-Factor Authentication (MFA) on Debian 12 Bookworm
- How to Configure Fail2Ban for SSH Brute Force Protection in Debian 12 Bookworm
- How to Configure SELinux on Debian 12 (Bookworm) System
- How to Audit System Logs for Suspicious Activity in Debian 12 Bookworm
- How to Secure MySQL/MariaDB Databases on Debian 12 Bookworm
- How to Set Up an Intrusion Detection System (IDS) in Debian 12 Bookworm
- How to Disable Unnecessary Services to Improve Security in Debian 12 Bookworm
- How to Restrict Access to Sudo Commands in Debian 12 Bookworm
- How to Prevent Unauthorized Sudo Access in Debian 12 Bookworm
- How to Set Up a VPN Kill Switch in Debian 12 Bookworm
- How to Secure the `/tmp` Directory in Debian 12 Bookworm
- How to Configure Security Updates to Install Automatically in Debian 12 Bookworm
- How to Log and Monitor Failed Login Attempts in Debian 12 Bookworm System
- How to Secure System Backups in Debian 12 Bookworm
- How to Prevent Brute-Force Attacks on Web Applications in Debian 12 Bookworm System
- How to Use Firejail to Sandbox Applications in Debian 12 Bookworm
- How to Set Up File Integrity Monitoring with AIDE on Debian 12 Bookworm
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.