Skip to content

SDSU-Research-CI/linux-hardening-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Linux Hardening Toolkit

This toolkit helps system administrators apply CIS Benchmark-aligned hardening for Ubuntu Linux environments (18.04–24.04 LTS), with WSL compatibility and automation.


πŸ“¦ Folder Structure

linux-hardening-toolkit/
β”œβ”€β”€ README.md
β”œβ”€β”€ VERSION
β”œβ”€β”€ CHANGELOG.md
β”œβ”€β”€ harden_launcher.sh
β”œβ”€β”€ scripts/
β”‚   β”œβ”€β”€ gnome2.sh
β”‚   └── [other .sh scripts...]

βœ… Supported Ubuntu Versions

  • 18.04 LTS
  • 20.04 LTS
  • 22.04 LTS βœ… tested
  • 24.04.3 LTS βœ… tested
  • WSL2 βœ… supported (with automatic exclusions)

πŸ”’ Uses CIS Level 1 Workstation guidance by default.


πŸ”– Version

Current Version: v1.1.1 Released: July 2, 2025 Maintainer: Alison Peterson


πŸš€ What's New in v1.1.1

  • βœ… Added -y to all apt install/remove/upgrade commands to suppress interactive prompts
  • βœ… Replaced ufw enable with ufw --force enable to avoid SSH disruption confirmation
  • βœ… Confirmed compatibility with Ubuntu 24.04.3 LTS
  • πŸ“ All scripts remain flattened under scripts/
  • πŸ”§ Logs enhanced at /var/log/hardening.log

βš™οΈ How to Use

  1. Clone the Repository

From any Linux system:

git clone https://github.com/SDSU-Research-CI/linux-hardening-toolkit.git
cd linux-hardening-toolkit
sudo chmod +x harden_launcher.sh
sudo ./harden_launcher.sh

πŸ“ Note: No need to manually upload or unzip files β€” run everything directly from the cloned folder.

  1. Follow the prompts:

    • Detects user and OS automatically
    • Smart detection of script folder
    • Runs critical scripts in order, then all others
    • Logs each result to /var/log/hardening.log
  2. Review Logs & Reboot if Needed


πŸ›  Post-Run Checklist

  • βœ… Review /etc/ssh/sshd_config
  • βœ… Run CIS-CAT Assessor for scoring
  • βœ… Apply kernel upgrades (if prompted)
  • βœ… Reboot to apply new modules and microcode

πŸ“¬ Contributions

Please coordinate through the Linux Working Group if you'd like to extend this for:

  • CIS Level 2 or STIG compliance
  • Server profile customization
  • Cloud-init or remote automation

Β© San Diego State University Β· College of Science Β· 2025

Maintained by: Alison Peterson

About

CIS-based hardening for Ubuntu workstations and servers

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages