Skip to content

Hardened an Ubuntu workstation using CIS benchmarks through a manual shell script. Enforced secure system settings including firewall rules, password policies, and SSH lockdown.

Notifications You must be signed in to change notification settings

KaidenW03/comptia-linux-HardenMachine

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Hardened Linux Workstation (Manual + Ansible)

Overview

This project implements a hardened Ubuntu workstation using both manual techniques and automated Ansible playbooks based on CIS benchmarks. It demonstrates how to secure a Linux system and automate system hardening tasks.

Tools Used

  • Ubuntu 22.04 LTS
  • Ansible
  • Bash
  • CIS Benchmark

Manual Hardening

Manual steps included disabling unused filesystems, setting secure file permissions, and enabling the firewall.

Further Automation

The same steps were automated using an Ansible playbook to demonstrate Infrastructure as Code principles. See playbook.yaml.

How to Run Ansible

cd ansible
ansible-playbook -i inventory playbook.yml

About

Hardened an Ubuntu workstation using CIS benchmarks through a manual shell script. Enforced secure system settings including firewall rules, password policies, and SSH lockdown.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages