Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Use latest LTS stable versions 
  2. Use minimum run-time code, minimize the amount of software installed on the system. 
    1. If you don't intend to use a piece of software, then don't install it. 
    2. If you don't intend to use a service, stop that service and uninstall it. 
    3. If you no longer need a piece of software, uninstall it. 
    4. If possible, run each network service on a separate system to minimize the risk of one compromised service being used to compromise another service. 
  3. Delete all compilers once finished building the images
  4. Use git-secrets for id management
  5. Each person should have their own individual account
  6. Each application should have its own individual account.
  7. Do not allow directly into the root account. This goes for any shared or application account as well. 
  8. Do not let users log in directly as the web server user, for example. At least require them to log into their individual accounts first, and then switch to the root or other shared account user. 
  9. When someone switches to another account, a log entry is created, and that can help with auditing.
  10. Practice least privilege.