The Server OS hardening guideline provides a subset of secure configuration benchmarks to server operating systems based on Center for Internet Security (CIS). The CIS Security Benchmarks program provides well-defined, un-biased and consensus-based industry best practices to help organizations assess and improve their security. Implementing the complete CIS Benchmarks are tedious and may cause disruptive problem to existing applications running on the system. As such, the guidelines have been prudently examined and distilled from the CIS Benchmarks in which it only includes the most critical items of security configuration. These guidelines are specific to individual operation systems and versions. The current available guidelines are listed below:
- Microsoft Windows Server 2008R2 / 2012 / 2012R2 / 2016 RTM 1607 / 2019 RTM 1809 / 2022
- CentOS 6 / 7 / 8
- RedHat Enterprise 6 / 7 / 8
- Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS
Apart from hardening server OS, we suggest to harden network devices, database and web servers.
Related Links
- Windows 2008 R2 Hardening Guide
- Windows 2012 Hardening Guide
- Windows 2012 R2 Hardening Guide
- Windows 2016 RTM 1607 Hardening Guide
- Windows 2019 RTM 1809 Hardening Guide
- Windows 2022 Hardening Guide
- CentOS 6 Hardening Guide
- CentOS 7 Hardening Guide
- CentOS 8 Hardening Guide
- RedHat Enterprise Linux 6 Hardening Guide
- RedHat Enterprise Linux 7 Hardening Guide
- RedHat Enterprise Linux 8 Hardening Guide
- Ubuntu 12.04 LTS Hardening Guide
- Ubuntu 14.04 LTS Hardening Guide
- Ubuntu 16.04 LTS Hardening Guide
- Ubuntu 18.04 LTS Hardening Guide
- Ubuntu 20.04 LTS Hardening Guide
- Ubuntu 22.04 LTS Hardening Guide
- Ubuntu 24.04 LTS Hardening Guide
- CIS Security Benchmarks Download
- Network Devices Hardening
- Database Hardening
- Apache Hardening
- IIS Hardening