Security Configuration¶
Administrator guide for security hardening and configuration.
Base Layer Security¶
SELinux¶
Enforcing mode by default:
SSH Hardening¶
Firewall¶
Organization Layer Security¶
FOSS Package Scanning¶
Security scan configuration:
# packages/organization/foss-packages/security/policies.yml
vulnerability_thresholds:
critical: 0
high: 2
medium: 10
low: 50
License Compliance¶
Only approved licenses:
Secrets Management¶
Ansible Vault¶
# Create vault
ansible-vault create secrets.yml
# Edit vault
ansible-vault edit secrets.yml
# Encrypt string
ansible-vault encrypt_string 'secret' --name 'var_name'
Environment Variables¶
Never commit secrets:
Audit Logging¶
Enabled by default:
Security Updates¶
Automatic updates:
Compliance¶
CIS Benchmarks¶
Base images follow CIS Rocky Linux 9 benchmarks.
Airgap Support¶
- Internal package mirrors
- No external dependencies
- Offline installation support
Security Monitoring¶
- Daily vulnerability scans
- Audit log review
- Access monitoring
- Update tracking