A guide to Infrastructure Hardening

Best practices to improve the security posture of your Linux-based infrastructure deployments

This whitepaper reviews a range of steps you can take to harden your infrastructure and make it more secure, from the base operating system to the application layer.

The ever-present threats of ransomware and data breaches make it imperative to lock down systems and prevent attackers from gaining a foothold. Hardening a system means reducing its attack surface and implementing defence in depth, such that even if a weakness is found, it doesn’t lead to an entire system compromise.

Using industry best-practice guidelines, such as the CIS benchmarks, this whitepaper will walk you through the process of hardening Linux-based deployments. It will also show you how to take advantage of the Ubuntu Security Guide, available with Ubuntu Pro, to automate many of these systems hardening steps and simplify the process.

Learn how to:

  • Tighten default settings
  • Remove unnecessary components
  • Configure logging
  • Keep software patched and up-to-date
  • Implement operational best practices
  • Follow industry standard guidelines
  • Use Ubuntu Pro’s automation tooling

Have questions? Contact us anytime here!

Want to learn more about Kubernetes security? Watch our recent webinar on System hardening and Kubernetes security here!
Avoid Kubernetes security risks with hardening best practices (1)

Contact information
  • In submitting this form, I confirm that I have read and agree to Canonical's Privacy Notice and Privacy Policy.