Linux Hardening Guide

Welcome to my Linux Hardening Guide! Last post I went over Windows hardening, now as promised on this post I will cover Linux. I will utilize the same structure as I did in my Windows guide. Again, I won’t cover many of the Physical controls and even some Administrative controls. We are assuming some of those are in place. Here we will mainly focus on Technical controls and the many layers we can implement to reduce the attack surface of a Linux machine.

For this guide I will be using a Ubuntu 20.04 machine. You can feel free to follow along using any Linux distribution. The version release I am using here is not the latest, but it is the most recent VMware image I could find without going on the Ubuntu site, grabbing the .iso file and creating a VMware image. I don’t have Workstation Pro installed on this machine, so I can’t create VMware images from .iso files here. Now that we have the environment laid down, let’s move forward!

I’ll be including a checklist here that will focus on an overview of objectives that should be addressed. This provides a solid focus on the main areas that will vastly reduce your attack surface. Here are the categories that I will focus on (in no particular order):

Firewall Setup

Enable and Configure UFW or nftables

Set up rules to allow only trusted IP addresses, block unwanted traffic, and restrict access to essential services.

Linux has several firewall options, most notably ufw or the “Uncomplicated Firewall”, iptables and nftables (which has now replaced iptables). I won’t go deep into how to configure these, there are plenty of resources for this online. But here is a quick run through of what setting up ufw is like:

As you can see I implemented some basic rules up above. You can also view and current rules you have in place like so:

Limit SSH Access

Restrict SSH to specific IP addresses and configure it to use a non-standard port.

If you have an IP address that is static (such the case with a VPN), limiting access to a specific IP or specific ranges greatly reduces that chance of a breach via SSH. Obviously, the lesser amount of possible connections incoming, the lesser the chance that unauthorized access event can occur. If you think about it in this perspective: If a user has the credentials for an account, but are limited by IP restrictions, they simply can’t log in.

Limiting IP access via SSH using ufw would look something like this:

With this rule only 192.168.2.100 would be allow to SSH into the machine.

Now, configuring a non-standard port for SSH is a great practice for a few reasons. First, it vastly reduces the chances that bots will start hammering away and attempting to brute-force an SSH login. This creates less traffic and keeps logs less congested. Second, all threat actors know what port 22 is for, its no secret. If you use the default SSH port, you are opening yourself up for more unauthorized login attempts.

Disable IPv6 (if not in use)

IPv6 can open additional attack surfaces, so disable it if it’s not necessary.

If you’re not using IPv6 for your network configuration, it is important you disable it simply to reduce your attack surface. There are other reasons for this too, such as preventing misconfigurations, avoiding wasted resources (systems logs, monitoring, etc.), meeting compliance and auditing requirements and preventing unexpected traffic.

On a modern Linux machine we can do this by accomplishing the following:

Once we open the configuration file, we need to add the following lines:

net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1

Once we save the configuration file we need to apply the system configuration changes by doing so:

Use SELinux or AppArmor

These Mandatory Access Control (MAC) systems enforce strict access rules beyond standard user permissions.

AppArmor and SELinux are Mandatory Access Control (MAC) frameworks used to enforce stricter access rules than traditional user and group permissions in Linux systems. They improve security by controlling what applications and processes can do, even if they are compromised.

Ubuntu machines come pre-loaded with AppArmor by default as do Dedian and SUSE distirubtions. SELinux (which was created by the NSA) comes pre-loaded wtih RHEL, CentOS and Fedora distributions.

These MAC frameworks can get pretty in-depth so I won’t go deeply into it here. Here’s what an AppArmor enabled system looks like:

Rate Limit Connections

Use rate limiting to prevent brute-force attacks by limiting the number of connection attempts

Rate limiting is an effective way to prevent brute-force attacks by restricting the number of connection attempts to a service (e.g., SSH) within a specific timeframe. This can be done using tools such as ufw, nftables or Fail2Ban.

Here’s an example of such practice using ufw:

sudo ufw limit ssh/tcp

If using a custom port (5422 in this example):

sudo ufw limit 5422/tcp

Use Fail2Ban or DenyHosts

Automatically block IPs that show malicious signs (e.g., too many failed SSH attempts)

Take a look at my post on Using Fail2Ban to Manage Brute Force Attacks for a in-depth look on how to setup Fail2Ban.

Account Management

Implement Least Privilege

Ensure users have only the permissions they need by using groups and limiting sudo access

This is a very important concept across all systems, not just Linux. It is vital that users are only given access to system that are essential to the functions of their role, nothing more. This means creating the appropriate groups with the necessary permissions, limiting sudo access and setting the proper file and directory permissions.

Enforce Strong Password Policies

Use PAM to enforce password complexity, length, expiration, and reuse rules

To enforce strong password policies on a Linux system, you can use PAM (Pluggable Authentication Module) to set rules for password complexity, length, expiration, and reuse.

First, we must install the necessary modules such as pam_pwquality:

sudo apt install libpam-pwquality

Now lets locate the configuration file:

sudo vi/etc/security/pwquality.conf

Here’s a look at the configuration file:

You can modify fields such as:

minlen = 12 # Minimum password length
minclass = 3 # Require at least 3 character classes (lowercase, uppercase, digits, special characters)
retry = 3 # Allow 3 retries before rejecting
dictcheck = 1 # Reject passwords matching dictionary words

We can also enforce password history like so:

sudo vi /etc/pam.d/common-password

Then we can edit the pam_unix line like so:

password requisite pam_pwhistory.so use_authtok remember=5 enforce_for_root

This will remember the last 5 used passwords and prevent reuse.

Now we can move on to setting password expiration rules:

sudo vi /etc/login.defs

PASS_MAX_DAYS 99999 # Maximum days a password is valid
PASS_MIN_DAYS 0 # Minimum days before a password can be changed
PASS_WARN_AGE 7 # Warn users 14 days before password expiration

These are where default policies are configured for new users. You can alter an individual user’s expiration parameters like so:

sudo chage --maxdays 90 --mindays 7 --warndays 14 ubuntu

Now we can confirm these took effect:

sudo chage -l ubuntu

Disable Root Login for SSH

Configure SSH to disallow root login to prevent unauthorized users from accessing the root account limit shh to IP (if possible)

First we need to edit the sshd_config file:

sudo vi /etc/ssh/sshd_config

Now we need to modify the “PermitRootLogin” line:

Once we save or changes to the config file, we must restart the sshd service:

sudo systemctl restart sshd

To limit access from a specific IP address, see the section above regarding Firewalls.

Use SSH Key Authentication

Require public key authentication for SSH, and disable password-based logins

Disabling password-based logins simplify the log in process whilst eliminating brute force attacks on passwords.

First, we need to generate our public and private keys:

ssh-keygen -t rsa -b 4096

Now save the file:

Next, we copy over the the public key to the server:

ssh-copy-id ubuntu@ubuntu2004

To disable password-based logins we must edit the sshd_config file again:

sudo vi /etc/ssh/sshd_config

Modify the value for “PasswordAuthentication” like so:

Again we must restart the sshd service:

sudo systemctl restart sshd

Audit User Accounts Regularly

Regularly review active accounts and remove any unused or obsolete accounts

It’s important to know what Users are in your environment. The /etc/passwd directory contains all User accounts on the system.

You can filter to list UIDs below 1000, which are generally system User accounts:

awk -F: '$3 >= 1000 {print $1}' /etc/passwd

You can use both the “last” and “lastlog” commands to see previous User activity. Using the “who” command displays any Users that are currently logged in to the system.

Furthermore, its important to verify password policies by using a command like so:

sudo chage -l ubuntu

Disabling, unlocking or removing User accounts may be required at times. See below for some information on utilizing the “usermod” command:

sudo usermod -L ubuntu #Locks account
sudo usermod -U ubuntu #Unlocks account
sudo userdel -r ubuntu #Deletes account

The last command I wanted to cover in this section is the command to audit dormant accounts. It’s important you remove any accounts that aren’t actively used to reduce your attack surface:

sudo find /home -maxdepth 1 -type d -mtime +90

This command will check for home directories that haven’t been modified in the last 90 days, which is a great way to identify dormant accounts.

Software Updates and Patch Management

Enable Automatic Security Updates

Set up automatic updates to keep your system patched for critical vulnerabilities

This specific section is distribution dependent, so the commands may vary. I will be using commands specific to the Debian/Ubuntu environment.

Lets begin by setting up unattended upgrades:

sudo apt update

sudo apt install unattended-upgrades

Now let’s edit the configuration file associated with the “unattended-upgrades” package:

sudo nano /etc/apt/apt.conf.d/50unattended-upgrades

Ensure the following lines are enabled (uncommented) to allow security updates:

Unattended-Upgrade::Allowed-Origins {
"${distro_id}:${distro_codename}-security";
"${distro_id}:${distro_codename}-updates";
};

Now that we have the configuration file set, we need to enable unattended upgrades:

sudo dpkg-reconfigure --priority=low unattended-upgrades

Once prompted, select “Yes”.

Finally, we need to test the changes:

sudo unattended-upgrade --dry-run --debug

Use Package Manager Security

Regularly update packages through apt, yum, or dnf, depending on your distribution

This is pretty straightforward, stay on top of updates and remove applications that you no longer use.

sudo apt update #Updates the package list
sudo apt upgrade #Upgrades installed packages
sudo apt full-upgrade #Performs a complete upgrade, including kernel and dependencies
sudo apt autoremove #Removes unused packages

Audit Installed Software

Regularly review installed packages and remove any unnecessary or deprecated software

Regularly auditing installed software is essential for maintaining security, system performance, and compliance. Unnecessary or deprecated software can introduce vulnerabilities or consume resources. Here’s how to audit and clean up installed packages based on your distribution:

dpkg --get-selections #Lists installed packages
apt list --installed #Filter by manually installed packages
sudo apt autoremove --dry-run #Lists unused dependencies
sudo apt remove <package_name> #Removes a specific package
sudo apt purge <package_name> #Removes a specific package and configuration files
dpkg --get-selections > installed_packages.txt #Exports package list into a text file for inventory control

Check for Unofficial Repositories

Avoid using unofficial repositories, as they may introduce unverified or outdated software

List Configured Repositories: Repositories are listed in /etc/apt/sources.list and /etc/apt/sources.list.d/. Use these commands to display them:

cat /etc/apt/sources.list
ls /etc/apt/sources.list.d/

Check the configured repositories and confirm standard and official URLs, for exaple:

http://archive.ubuntu.com/ubuntu/
http://security.ubuntu.com/ubuntu/

Next we must verify GPG keys by listed them via the following command:

apt-key list

Look for keys you don’t recognize or that are expired.

Enable Kernel Live Patching (if available)

Use live patching services to apply kernel patches without rebooting (e.g., Canonical Livepatch for Ubuntu)

Since we are on Ubuntu for this guide, I will quickly for through the Livepatch client install and operation.

sudo apt install snapd

Next we will enter the following command to install the client:

sudo snap install canonical-livepatch

Once the client is installed, you need to create a Ubuntu One account at Ubuntu Livepatch.

Once you create an account you must register your system and obtain the Livepatch token. Then you must use the token to enable the service:

sudo canonical-livepatch enable <your-token>

Then you can check that Livepatch is enabled:

canonical-livepatch status

Data Encryption and File Protection

Encrypt Disk Partitions with LUKS

Encrypt sensitive partitions like /home or /data to protect data in case of physical theft

LUKS is basically the BitLocker for Linux. Let’s take a quick look on how to set this up.

First we must list the available disks and partitions:

sudo lsblk

From here you need to identify which partition you want to encrypt. First you must unmount the partition like so:

sudo umount /dev/sda1

Now that we have the partition unmounted, we can proceed with initializing LUKS on the partition:

sudo cryptsetup luksFormat /dev/sda1

Opening the encrypted partition:

sudo cryptsetup open /dev/sda1 <encrypted_partition>

Now we can format a filesystem for the encrypted partition:

sudo mkfs.ext4 /dev/mapper/encrypted_partition

Next we have to create a mount point (data in this case) and mount the new encrypted partition:

sudo mkdir /data

sudo mount /dev/mapper/encrypted_partition /data

Finally we can verify the mount:

df -h

Use GPG for File Encryption

Encrypt sensitive files individually using GPG to provide additional security for specific data

Using GPG (GNU Privacy Guard), you can encrypt sensitive files individually to enhance their security. GPG provides robust encryption methods and is widely used for secure file handling.

Here’s how to encrypt files with GPG:

gpg --symmetric --cipher-algo AES256 sensitive_file.txt

You’ll be prompted to enter a passphrase and confirm it.

To decrypt the file the process is similar, but the command is slightly different:

gpg --decrypt --output sensitive_file.txt.gpg > sensitive_file.txt

Enable SSH Host Key Verification

Verify SSH keys for secure connections, especially when transferring sensitive data

Enabling SSH host key verification is a crucial security measure to ensure you’re connecting to the correct server and not a malicious one. SSH host key verification works by comparing the server’s host key to a known key stored on your system, preventing man-in-the-middle (MITM) attacks.

First, we must open the SSH client configuration file:

vi ~/.ssh/config

If the file does not exist, you must create it and add the following lines:

Host *
StrictHostKeyChecking ask
UserKnownHostsFile ~/.ssh/known_hosts

You can verify the server’s host key by displaying it via the following command:

ssh-keyscan -H <server_ip>

You can then add the key manually to ~/.ssh/known_hosts:

ssh-keyscan -H <server_ip> >> ~/.ssh/known_hosts

Apply Correct File Permissions

Regularly reviewing and setting appropriate file permissions ensures that only authorized users can access sensitive files, reducing the risk of unauthorized access or data leaks. It’s important to be aware and set the appropriate permissions for files and directories.

Secure Backups

Encrypt backups and store them in secure locations to prevent unauthorized access

Use LUKS, OpenSSL or GPG for backup encryption. See the section above for Data Encryption.

Logging and Monitoring

Centralize Logs with rsyslog or syslog-ng

Configure centralized logging for easier review and storage.

Centralized logging is crucial because it consolidates logs from multiple systems into a single location, making it easier to monitor, analyze, and troubleshoot issues across an environment. It also enhances security and compliance by ensuring logs are stored securely and are readily available for audits or incident response.

I’ll quickly cover the basics of setting up centralized logging using rsyslog:

First, we need to install rsyslog:

sudo apt install rsyslog

Once installed, let’s make some changes to enable a TCP connection:

sudo vi /etc/rsyslog.conf

Uncomment the TCP syslog reception (I’ll be using the default port here, you can use whatever works for you).

Now that we have the configuration file set we can go ahead and create our logging directory.

Now we need to append a rule to /etc/rsyslog.conf:

$template RemoteLogs,"/var/log/remote/%HOSTNAME%/%PROGRAMNAME%.log"
*.* ?RemoteLogs

After creating the directory and our rule, we will need to restart the service to have the changes we made go into effect.

After this point you will have to start setting things up on the client-side. I won’t demonstrate that here as that would require me to spin up more machines, but here is a quick overview on what needs to be done.

Install rsyslog:

sudo apt update
sudo apt install rsyslog

Add the server’s IP address to /etc/rsyslog.conf:

*.* @@<server-ip>:514 # For TCP
*.* @<server-ip>:514 # For UDP

Restart rsyslog:

sudo systemctl restart rsyslog

Now you can go ahead and send a test log to the central server.

Set Up Log Rotation

Use log rotation to manage log size and prevent excessive storage use.

Let’s begin by installing logrotate:

sudo apt install logrotate

Now we need to create a configuration file for your log. Logrotate configuration files are stored in /etc/logrotate.d:

sudo nano /etc/logrotate.d/mylog

Now let’s add the configuration options (myapp.log is an example log):

/var/log/myapp.log {
daily # Rotate logs daily (alternatives: weekly, monthly)
rotate 7 # Keep 7 rotated logs
compress # Compress rotated logs
missingok # Ignore missing logs
notifempty # Skip rotation if the log is empty
copytruncate # Truncate the log after copying it
}

Save the configuration and test:

sudo logrotate -d /etc/logrotate.conf

This runs a dry run and shows what would happen without making changes.

Now, force log rotation for testing:

sudo logrotate -f /etc/logrotate.conf

Enable Auditd

Use the Linux audit daemon (auditd) to monitor system calls and generate audit logs for compliance:

sudo apt install audispd-plugins

Confirm the installation:

dpkg -l | grep audispd-plugins

Modify the /etc/audit/auditd.conf configuration file like so:

log_format = RAW

Restart the service:

sudo systemctl restart auditd

Logwatch for Log Summaries: Set up Logwatch to send regular log summaries, helping you spot unusual activities.

I won’t go into detail on setting this up. Please consult outside sources.

Configuring Privacy Settings

Disable Unused Services

Turn off services that aren’t required to minimize exposure

Identify running services using the following command:

sudo systemctl list-units --type=service --state=running

Use the following command to disable a service at startup:

sudo systemctl disable <service_name>

To stop it immediately:

sudo systemctl stop <service_name>

To permanently block unwanted services:

sudo systemctl mask <service_name>

To unblock (if needed):

sudo systemctl unmask <service_name>

Common Services You Might Disable

ServiceDescriptionDisable If Not Needed?
cupsPrinter serviceYes, if no printers
bluetoothBluetooth daemonYes, if not using Bluetooth
nfsNetwork File SystemYes, if not using network shares
rpcbindRemote procedure call bindingYes, if not using NFS/NIS
apache/httpdWeb serverYes, if no web server needed
smbSamba file sharingYes, if no Windows file sharing needed
ftpFile Transfer ProtocolYes, unless running an FTP server
telnetRemote login (insecure)Yes, use SSH instead

Configure SSH for Privacy

Disable verbose banners and other information disclosures in SSH

Let’s start by disabling SSH banners. We must edit the sshd_config configuration file like so:

sudo vi /etc/ssh/sshd_config

Then, we must prveent SSH from showing system information:

# Prevents revealing OpenSSH version
VersionAddendum none

# Limits authentication failure messages
LogLevel QUIET

Hide Usernames from failed logins:

sudo vi /etc/pam.d/sshd

Edit the configuration file by adding the following:

auth required pam_faildelay.so delay=2000000

Next, disable MOTD and Issue Messages:

sudo chmod -x /etc/update-motd.d/*

Prevent issue.net from displaying:

sudo nano /etc/issue.net

Remove or comment out any text here.

In /etc/ssh/sshd_config, ensure:

PrintMotd no
PrintLastLog no

Limit User Data Exposure

Restrict access to system information (like /etc/passwd) by using tools like usermod or chmod

Restrict access to /etc/passwd and /etc/shadow. By default, /etc/passwd is world-readable, but it should not be world-writable. The /etc/shadow file, which contains password hashes, should only be accessible by root.

Next, let’s restrict User Listing (who, w, finger).

Prevent non-root Users from seeing other Users. Set /proc restrictions to limit user listing:
echo 1 | sudo tee /proc/sys/kernel/yama/ptrace_scop

Make it persistent across reboots:
echo "kernel.yama.ptrace_scope = 1" | sudo tee -a /etc/sysctl.conf
sudo sysctl -p

Restrict Access to User home directories. By default, home directories may be readable by all users. Restrict access so only the owner can read/write.

Check current permissions:
ls -ld /home/*


Restrict home directory access. To allow only the owner to access their home directory:
sudo chmod 700 /home/*


This ensures only the user can access their files. Next, disable Finger and User Info Commands. Commands like finger and who expose user details.

Uninstall finger if present:
sudo apt remove finger # Debian-based
sudo dnf remove finger # RHEL-based

Restrict who, w, last. Edit /etc/pam.d/sshd:
sudo nano /etc/pam.d/sshd

Add:
account required pam_access.so

Next, Lock Unused User Accounts. Disable unused accounts to minimize risk:

sudo usermod --expiredate 1 username

Or completely remove an unused user:
sudo userdel -r username

Finally, restrict Access to su. Create the wheel group (if it doesn’t exist):
sudo groupadd wheel

Add allowed users to the wheel group:
sudo usermod -aG wheel youruser

Restrict su access: Edit /etc/pam.d/su:
sudo nano /etc/pam.d/su

Uncomment this line:
auth required pam_wheel.so

Save and restart PAM:
sudo systemctl restart sshd

Enable System Anonymization

Use tools like macchanger for randomizing MAC addresses or disable hostname broadcasts

Install macchanger:

sudo apt update
sudo apt install macchanger

See the manual page for this tool for more information.

Control Metadata on Shared Files

Remove or limit metadata from shared documents to prevent information leakage

Use tools like exiftool and pdfinfo to remove metadata from files. I won’t go into detail on how to do that here. There is a plethora of information available on how to accomplish this.

General Configurations

Secure Bootloader with GRUB Password

Set a password for GRUB to prevent unauthorized access or modifications to boot parameters

Setting a password for GRUB helps prevent unauthorized users from modifying boot parameters (e.g., entering single-user mode or changing kernel options) and gaining elevated privileges.

Limit SUID/SGID Binaries

Regularly review and restrict setuid and setgid permissions, as they can allow privilege escalation

First we must identify SUID and SGID binaries:

Find SUID binaries:

sudo find / -perm -4000 -type f 2>/dev/null

Find SGID binaries:

sudo find / -perm -2000 -type f 2>/dev/null

Find SUID/SGID Binaries together:

sudo find / -perm /6000 -type f 2>/dev/null

Next we analyze and restrict unnecessary SUID/SGID bianries:

Remove SUID from a File:
sudo chmod u-s /path/to/file

Remove SGID from a File:
sudo chmod g-s /path/to/file

Example: Remove SUID from ping:
sudo chmod u-s /bin/ping

Lastly, prevent SUID/SGID Binaries in User Home Directories. To ensure users cannot set SUID/SGID permissions, modify /etc/fstab to disable SUID for home directories.

Edit /etc/fstab
sudo nano /etc/fstab


Find the line for /home, and add nosuid:
/dev/sdX /home ext4 defaults,nosuid 0 2

Save and remount:
sudo mount -o remount /home

Enable Intrusion Detection

Use tools like AIDE or OSSEC to monitor changes to critical files and alert on suspicious activity

Install AIDE or similar to monitor file integrity:

I won’t go into detail on how to configure this tool. There are plenty of resources available online.

Limit Kernel Modules

Remove or disable unneeded kernel modules to reduce the system’s attack surface

List all loaded modules
lsmod


Check if a specific module is loaded
lsmod | grep


View detailed module information
modinfo

Example:

modinfo usb_storage

Next, you would want to identify the unnecessary modules and remove them.

If you find a module that should not be loaded, remove it temporarily using:
sudo modprobe -r

Example:
sudo modprobe -r usb_storage


Note: This change is not persistent and will reset after reboot.

To prevent a module from loading at boot, blacklist it.

Option 1: Use modprobe Blacklisting

Edit the blacklist file:
sudo nano /etc/modprobe.d/blacklist.conf

Add the module names to disable:
blacklist usb_storage
blacklist firewire-core
blacklist bluetooth

Save and exit.

Update the initramfs (for persistence):
sudo update-initramfs -u

Reboot and verify:
lsmod | grep

Option 2: Disable Modules via Kernel Parameters
For a stricter approach, disable modules at the kernel level.

Edit the GRUB configuration:
sudo nano /etc/default/grub

Add the following to GRUB_CMDLINE_LINUX:
modprobe.blacklist=usb_storage,firewire-core,bluetooth

Example:
GRUB_CMDLINE_LINUX="quiet splash modprobe.blacklist=usb_storage,firewire-core,bluetooth"

Save and update GRUB:
sudo update-grub

Reboot and verify.

Lastly, let’s cover how to remove unnecessary kernel modules completely.


If you never need a module, remove it from the system.

Find the module package:
dpkg -S # Debian-based
rpm -qf $(modinfo -n ) # RHEL-based

Uninstall the package:
sudo apt remove # Debian-based
sudo dnf remove # RHEL-based

Enable Immutable Flag on Key Files

Use the chattr +i command to make critical configuration files (e.g., /etc/passwd, /etc/shadow) immutable. This prevents even root from modifying or deleting them without first removing the immutable flag

Enable the Immutable Flag (+i)
To make a file immutable, use the chattr command. Protect /etc/passwd and /etc/shadow:
sudo chattr +i /etc/passwd
sudo chattr +i /etc/shadow

Protect /etc/fstab (Prevent Unauthorized Mounts)
sudo chattr +i /etc/fstab

Protect SSH Configuration (/etc/ssh/sshd_config)
sudo chattr +i /etc/ssh/sshd_config

Verify Immutable Flag. After applying +i, verify the flag with:
lsattr /etc/passwd /etc/shadow /etc/fstab /etc/ssh/sshd_config

Example output:
----i-------- /etc/passwd
----i-------- /etc/shadow
----i-------- /etc/fstab
----i-------- /etc/ssh/sshd_config

The i indicates the file is immutable.

Disable Immutable Flag (if necessary). If you need to update a file, you must remove the immutable flag first.

To disable the immutable flag:
sudo chattr -i /etc/passwd
sudo chattr -i /etc/shadow


Now, you can modify the file. After making changes, re-enable the immutable flag:
sudo chattr +i /etc/passwd

Prevent Unauthorized Removal of Immutable Flags. To ensure only root can remove +i, restrict chattr:
sudo chmod 700 /usr/bin/chattr

Enable Logging for Sudo Commands

Configure sudo to log all commands executed with elevated privileges by adding Defaults logfile=”/var/log/sudo.log” to the /etc/sudoers file. This creates a trail of privileged actions that can be audited in case of suspicious activity

First, we must configure Sudo to log commands:

Open the sudoers configuration:
sudo visudo

Add the following line at the end:
Defaults logfile="/var/log/sudo.log"

Save and exit.

Now we must verify Sudo logging. After adding the configuration, test logging:

Run a sudo command:
sudo ls /root

Check the log:
cat /var/log/sudo.log

Example output:
Jan 05 14:30:12 user : TTY=pts/0 ; PWD=/home/user ; USER=root ; COMMAND=/bin/ls /root

Restrict Shell Access for System Accounts

For system and service accounts that do not need interactive login access, set their shell to /usr/sbin/nologin or /bin/false in /etc/passwd. This prevents attackers from accessing these accounts via shell, reducing potential entry points.

System and service accounts do not require interactive shell access. Restricting their login shell helps reduce attack surfaces and prevents unauthorized access.

Let’s identify system accounts. To find non-human accounts that might have shell access, run:
cat /etc/passwd | grep -E "/bin/bash|/bin/sh"

This lists accounts with interactive shell access. Alternatively, list all system accounts (UID < 1000 on most systems):
awk -F: '($3 < 1000) {print $1, $7}' /etc/passwd

Next let’s restrict shell access for system accounts. Set the login shell to /usr/sbin/nologin (preferred) or /bin/false.

/usr/sbin/nologin → Displays a “This account is currently not available” message.

/bin/false → Denies access without a message.

Modify a specific account. To prevent a specific account from logging in:
sudo usermod -s /usr/sbin/nologin

Example:
sudo usermod -s /usr/sbin/nologin apache

Modify multiple accounts. To change all system accounts that should not have shell access:
for user in awk -F: '($3 < 1000 && $7 !~ /nologin|false/) {print $1}' /etc/passwd; do
sudo usermod -s /usr/sbin/nologin $user
done

Lastly, verify changes. Check if the account’s shell has been updated:
grep "" /etc/passwd

Example:
grep "apache" /etc/passwd

Expected output:
apache:x:48:48:Apache:/usr/share/httpd:/usr/sbin/nologin

More to come…!!!