Explore advanced web security techniques including Content Security Policy (CSP), Subresource Integrity (SRI), and automating these practices in your CI/CD pipeline to ensure robust protection against modern cyber threats.
Learn how to automate security audits using Bash scripts to ensure your systems remain secure and compliant. Perfect for both seasoned and novice sysadmins.
Welcome to the inaugural post of “Security Sunday” on hersoncruz.com! Every Sunday, we’ll delve into essential security practices and share scripts that will help sysadmins fortify their servers and keep cyber threats at bay. Let’s get started with some foundational security practices and a few handy scripts to automate these tasks.
Learn how to harden your SSH service with secure configurations and key-based authentication. This guide will walk you through setting up a public-private key pair, creating regular user keys, and configuring your SSH service for enhanced security. By following these steps, you will prevent root login, use non-standard ports, and ensure only key-based authentication is allowed, significantly improving your server’s security.