Article Index

32.Lock Code Circular

Tips and Tools for Defending Linux Servers Against Malware

With attacks targeting Linux servers becoming increasingly common and dangerous, defending against malware and other advanced threats is more critical than ever in maintaining a secure Linux system. Some tips and best practices for securing Linux servers include:

  • Double check all cloud configurations - user misconfiguration and lack of visibility are the top causes of attacks in the cloud.
  • Ensure that remote access portals are properly secured - many network-level attacks where criminals need root or admin powers are made possible because attackers find their way in through a legitimate, insecure remote access portal.
  • Create a complete inventory of all devices connected to a network, and update all security software used on these devices frequently.
  • Make sure that all external-facing services are fully patched. Be aware that firewall security is not a substitute for an organization’s own cloud security measures.
  • Set special rules in your firewall to block control packets specific to Cloud Snooper.
  • Enable multi-factor authentication on all security dashboards or control panels used internally to prevent threat actors from disabling security software in the case of an attack.
  • Review system logs regularly. It’s rare that threat actors are able to take over servers without leaving some trace of their actions – such as log entries showing unexpected or unauthorized kernel drivers being activated. Keep in mind, however, that criminals who already have root powers can tamper with your logging configuration and the logs themselves, making it more difficult to spot malicious activity.
  • Remember that a comprehensive, defense-in-depth approach to security is essential in protecting your system from modern, advanced exploits.