bonnes pratiques de sécurité pour une station de travail linux
1: Enable AWS VPC Flow Logs for your VPC or Subnet or ENI level
2: Use AWS Identity and Access Management (IAM) to control who in your organization has permission to create and manage security groups and network ACLs (NACL)
3: Enable AWS Cloud Trail logs for your account
4: Enable AWS App Config for your AWS account. App records all events related to your security group changes and can even send emails
5: Have proper naming conventions for the Amazon Web Services security group
7: Periodically detect, alert or delete AWS Security groups not following the organization naming standards strictly
8: Have automation in place to detect all EC2,ELB and other AWS assets associated with Security groups
9: Create your own security groups and specify them when you launch your instances
10: Alerts by email and cloud management dash board should be triggered whenever critical security groups or rules are added/modified/deleted in production
11 : Have automated programs detecting EC2 associated with multiple SG/rules and alert the SOC/MS periodically. Condense the same manually to 1-3 rules max as part of your operations.
12 : Do not create least restrictive security groups like 0.0.0.0/0 which is open to every one
13: Have a security policy not to launch servers with default ports like 3306, 1630, 1433, 11211, 6379 etc
15: Detection, alert and actions can be taken by parsing the AWS Cloud Trail logs based on usual patterns observed in your production environment. Detect anomalies on how long a change effected and reverted in security groups in production.
16: In case ports have to be opened in Amazon Web Services security groups or a permissive AWS security group needs to be applied, Automate this entire process as part of your operations
17: Make sure SSH/RDP connection is open in AWS Security Group only for jump box/bastion hosts for your VPC/subnets. Have stricter controls/policies avoid opening SSH/RDP to other instances of production environment
18: It is a bad practice to have SSH open to the entire Internet for emergency or remote support
20: Avoid allowing UDP or ICMP for private instances in Security groups
21: Open only specific ports, Opening range of ports in a security group is not a good practice.
22: Private Subnet instances can be accessed only from the VPC CIDR IP range
23: AWS CloudTrail log captures the events related security. AWS lambda events or automated programs should trigger alerts to operations when abnormal activities are detected
24: In case you are an enterprise make sure all security groups related activities of your production are part of your change management process. In case you are an agile Startup or SMB and do not have complicated Change management process, then automate most of the security group related tasks and events as illustrated above on various best practices
26: For some tiers of your application, use ELB in front your instance as a security proxy with restrictive security groups
Bonnes pratiques de sécurité à mettre en place sur debian
tl;dr
- ne pas réutiliser le même password
- ne pas utiliser un mot issu du dictionnaire comme mot de passe
- utiliser des nombres comme moyen de substitution des voyelles n'est pas plus secure
- utiliser un mot de passe long
- utiliser l’identification en 2 temps quand elle est disponible
- donnez des réponses bidons aux questions de sécurité
- réduisez votre présence en ligne
- utilisez une adresse unique de récupération de mots de passe(créer un compte spécial que vous n’utilisez jamais pour communiquer mais uniquement pour recevoir ces remises à zéro et choisir un nom d’utilisateur pour cet email qui n’est pas lié à votre vrai nom)
- utiliser une bonne résolution comme mot de passe (ex: "jarretedefumerle1eravril" ou "jevaisfairedusport2foisparsemaine"
Keepass en ligne de commande
EDIT: dans le même genre mais en perl et compatible KeePass 2.X http://kpcli.sourceforge.net/
Pour tester l’entropie de ces mots de passe.
https://tech.dropbox.com/2012/04/zxcvbn-realistic-password-strength-estimation/
A garder sous le coude en cas de hacking