Defence-in-depth for Rocky Linux servers — SELinux mandatory access control, SSH hardening, centralised identity with FreeIPA, brute-force protection, and audit trail management.
SELinux is baked into Rocky Linux from day one, running in Enforcing mode by default. Every process and file has a security context label — the kernel checks these labels before every file access, network socket open, or process fork.
Rather than disabling SELinux (a common but dangerous shortcut), learn the key tools to work with it effectively.
setenforce 0 or SELINUX=disabled in /etc/selinux/config eliminates your MAC layer entirely. Use audit2allow to create targeted policies instead.OpenSSH is pre-installed on Rocky Linux. The default config is functional but not maximally hardened. These changes eliminate the most common attack vectors: brute-force password attacks, root login abuse, and weak cipher negotiation.
ssh-audit 192.168.1.10 (install via pip) to detect weak ciphers, MACs, and key exchange algorithms with a full report.
FreeIPA bundles Kerberos, LDAP (389 Directory Server), DNS, NTP, and a web-based CA into a single integrated identity platform. Enrol all your Rocky Linux machines and manage users, groups, SSH keys, sudo rules, and HBAC from one place.
Fail2Ban monitors log files and temporarily bans IPs that show malicious patterns — failed SSH logins, repeated web 404s, or SMTP AUTH failures. It writes ban rules directly into firewalld on Rocky Linux.
sshd
Failed SSH login attempts
nginx-http-auth
Nginx auth failures
postfix
SMTP brute-force
dovecot
IMAP/POP3 failures
vsftpd
FTP login failures
apache-auth
Apache 401 responses
mysqld-auth
MySQL auth failures
The Linux Audit daemon (auditd) records system calls, file access, and user actions to /var/log/audit/audit.log. Combined with ausearch and aureport, it provides a complete forensic trail for compliance and incident response.
openscap-scanner package provides automated compliance scanning against these benchmarks.Our security team performs Rocky Linux hardening audits, FreeIPA deployments, and ongoing vulnerability management for enterprise environments.