https://store-images.s-microsoft.com/image/apps.44192.0d4fb643-b53d-4357-bbce-a7873642f5d2.5d3814e6-b242-4c96-a630-5dfe6e41277c.e3a2a217-db5a-4ecb-b794-1a6e2a4ebca8

Secure Linux - RedHat 7.4

BISSaN Technology

Secure Linux - RedHat 7.4

BISSaN Technology

Securely built Linux operating system with applied industry security standards & best practices.

A BISSaN Hardened Windows Server Operating System image provides a security focused environment ideal for running web applications, databases and application servers and helps in mitigating common threats such as insufficient authorisation, network & program attack threats.

The Operating System is thoroughly scanned, vetting each and every base component within every release leveraging a pool of industry certified security auditing tools. The Operating System is initially stripped from all the unnecessary insecure packages, settings and permissions. The base system is then further tuned, patched and hardened applying security recommendations from leading security industry organisations, standards and governing bodies such as the ISO, SOC and NIST to adhere and meet security regulations and compliance. This ensures you have a secure environment to run your application and hit the ground running upscaling your security posture and audit compliance within your organisation.

Stack Tuning: Once the Operating System has been secured it is then tuned to optimise the networking stack with thoroughly tested and benchmarked parameters ensuring the web application, database or application server can run to its most efficient capability with the required memory, process and networking stack throughput.

Included within the Image:

  • Virus Scanner - ability to be executed on an adhoc basis or regular cadence to ensure files and packages are vetted appropriately and eliminate threats
  • Shell Command Logger - Logs each and every users shell command executions to “/var/log/secure” for auditing and traceability purposes. Providing the ability to perform forensics and detail investigations in determining the user and the commands executed. Secure logs then be shipped to your favourite SIEM tool for monitoring and auditing purposes as well
  • Update default Login Security Banner: /etc/issue.net

VM Creation Min Password Policy
Set the admin/users password using the policy below to gain access to the VM.

  • Not contain the user's account name or parts of the user's full name that exceed two consecutive characters
  • Be at least 14 characters in length
  • Contain characters from three of the following four categories:
    • English Uppercase characters (A through Z)
    • English Lowercase characters (a through z)
    • Base 10 digits (0 through 9)
    • Non-alphabetic characters (for example, !, $, #, %)

Recommended: Once deployed, any new package that is required should be installed from a reliable source repository and rescanned to validate no new vulnerabilities have been introduced before approving.

Security is not an option but a necessity. Increase your security posture with a BISSaN Security Hardened Operating System.

https://store-images.s-microsoft.com/image/apps.52640.0d4fb643-b53d-4357-bbce-a7873642f5d2.5d3814e6-b242-4c96-a630-5dfe6e41277c.a7abf967-25de-4497-86d8-e2f0a9850eee
https://store-images.s-microsoft.com/image/apps.52640.0d4fb643-b53d-4357-bbce-a7873642f5d2.5d3814e6-b242-4c96-a630-5dfe6e41277c.a7abf967-25de-4497-86d8-e2f0a9850eee
https://store-images.s-microsoft.com/image/apps.62009.0d4fb643-b53d-4357-bbce-a7873642f5d2.5d3814e6-b242-4c96-a630-5dfe6e41277c.c0206448-4b51-44a9-9378-07d876d07e4f
https://store-images.s-microsoft.com/image/apps.19394.0d4fb643-b53d-4357-bbce-a7873642f5d2.5d3814e6-b242-4c96-a630-5dfe6e41277c.c29af29c-8e8d-4031-8c9e-04c8a61b5e09
https://store-images.s-microsoft.com/image/apps.7517.0d4fb643-b53d-4357-bbce-a7873642f5d2.18ff6616-4054-4e00-9a97-28f28dddc124.3a67be4a-e789-42f7-8c5b-4aaefd39bd26