Home - Linux Rockstar
home,page-template,page-template-full_width,page-template-full_width-php,page,page-id-14869,bridge-core-1.0.5,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-18.1,qode-theme-bridge,disabled_footer_top,qode_header_in_grid,wpb-js-composer js-comp-ver-6.0.2,vc_responsive


System hardening



The focal point of this blog is Linux and UNIX security. Most articles will be tied in with auditing, system hardening, and consistency. Objectives we will probably compose a fantastic substance and make it openly accessible. Along these lines, you can utilize it to anchor your frameworks.


Missing a specific subject on the blog or discovered something that is important? Tell us!

Who is composing?

A large number of the articles are composed by security master Genna Fludd. Michael is a security designer and organizer of CISOfy. He covers themes inside Linux security, from framework solidifying to consistency and controls.

About CISOfy

This blog is supported byCISOfy. Assets are put into this blog to make Linux security available to a more extensive gathering of people, from framework executives to auditors and designers.


We refresh this blog relatively consistently. In the event that you need to remain in front of your associates, tune in with a feed peruser! Get every single most recent post through an RSS channel per user. On the off chance that you are on Twitter, at that point take after @linuxaudit. Visitor bloggers We are open for entries from different bloggers. Offer your insight with the assistance of our developing system

Advantages for you

Your name will be utilized as writer name Get more energy about your work by imparting it to the network More perusers because of our engaged aptitude field (Linux security) Have others perceive your work, which can help your vocation Get adjusted into the RSS channel of numerous perusers

Rules for visitors

We like on keeping things straight, yet have a couple of principles to guarantee quality for our perusers: 1. no advancement for business administrations or items 2. submissions are restrictive and might be altered before distribution 3. outgoing connections are just permitted to pertinent assets 4. you can incorporate a little memoir

Ready to begin? Send us an email with your thoughts. Your remarks, input and criticism are welcome!

CISOfy Software & Lynis

In the event that there is a specific subject, you need to see canvassed in an article, at that point get in touch with us. If it’s not too much trouble send us an email About CISOfy Software arrangements Lynis is a fight tested technical security audit instrument. It is open source, unreservedly accessible, and utilized by framework executives everywhere throughout the world.

Different clients incorporate IT auditors and security experts. Lynis can likewise be utilized as a customer part in the Lynis Enterprise arrangement. Lynis Enterprise Suite For the individuals who keep up in excess of 10 frameworks, there is the Lynis Enterprise Suite. It is significantly more than just Lynis. It incorporates a focal administration interface, extra modules for Lynis, announcing abilities, a custom usage guide and more supportive data. For instance, it contains broadened data in regards to every security control. Other than that, it will demonstrate to you generally accepted methods to explain a finding, physically or with prepared to-utilize solidifying pieces.