การป้องกันเชิงลึกสำหรับเซิร์ฟเวอร์ Rocky Linux — SELinux mandatory access control, SSH hardening, identity รวมศูนย์ด้วย FreeIPA, การป้องกัน brute-force และการจัดการ audit trail
SELinux is baked into Rocky Linux from day one, running in Enforcing mode by default. Every process and file has a security context label — the kernel checks these labels before every file access, network socket open, or process fork.
Rather than disabling SELinux (a common but dangerous shortcut), learn the key tools to work with it effectively.
setenforce 0 or SELINUX=disabled in /etc/selinux/config eliminates your MAC layer entirely. Use audit2allow to create targeted policies instead.OpenSSH is pre-installed on Rocky Linux. The default config is functional but not maximally hardened. These changes eliminate the most common attack vectors: brute-force password attacks, root login abuse, and weak cipher negotiation.
ssh-audit 192.168.1.10 (install via pip) to detect weak ciphers, MACs, and key exchange algorithms with a full report.
FreeIPA bundles Kerberos, LDAP (389 Directory Server), DNS, NTP, and a web-based CA into a single integrated identity platform. Enrol all your Rocky Linux machines and manage users, groups, SSH keys, sudo rules, and HBAC from one place.
Fail2Ban monitors log files and temporarily bans IPs that show malicious patterns — failed SSH logins, repeated web 404s, or SMTP AUTH failures. It writes ban rules directly into firewalld on Rocky Linux.
sshd
Failed SSH login attempts
nginx-http-auth
Nginx auth failures
postfix
SMTP brute-force
dovecot
IMAP/POP3 failures
vsftpd
FTP login failures
apache-auth
Apache 401 responses
mysqld-auth
MySQL auth failures
The Linux Audit daemon (auditd) records system calls, file access, and user actions to /var/log/audit/audit.log. Combined with ausearch and aureport, it provides a complete forensic trail for compliance and incident response.
openscap-scanner package provides automated compliance scanning against these benchmarks.ทีมความปลอดภัยของเราดำเนินการตรวจสอบ Rocky Linux hardening, การ deploy FreeIPA และการจัดการช่องโหว่อย่างต่อเนื่องสำหรับสภาพแวดล้อมองค์กร