2.4 KiB
2.4 KiB
Weekly Security Posture Scan
Targets
- forge (localhost / 192.168.1.16) — James' home
- james-old (192.168.1.17) — retired, still running
- staging/dev (192.168.1.253) — home server
- prod (192.168.100.2) — inou prod (when available)
- caddy (192.168.0.2 / 100.84.42.55) — reverse proxy
- zurich.inou.com (82.22.36.202) — VPS
- amsterdam.inou.com (82.24.174.112) — VPS
- UDM-Pro (192.168.0.1) — core router
Per-Host Checks (VPS/Linux)
Intrusion Detection
last -20— any logins from unknown IPs?lastb | head -30— brute force attempts (volume/pattern)cat /etc/passwd | awk -F: '$3>=1000'— unauthorized users?cat ~/.ssh/authorized_keys— compare against known keys baselinefind /home -name authorized_keys -exec cat {} \;— same for all userscrontab -l; ls /etc/cron.d/— rogue cron jobs?ps aux | grep -v '\[' | sort -k3 -rn | head -20— suspicious processes?ss -tnp | grep -v '127.0.0\|::1'— unexpected outbound connections?find / -mtime -7 -type f -name '*.sh' 2>/dev/null— recently modified scriptsdocker ps -a— unauthorized containers?- Check for rootkits:
rkhunter --check --skip-keypressorchkrootkit
Hardening Verification
sshd -T | grep -E 'passwordauth|permitroot'— still hardened?ufw status— rules unchanged?fail2ban-client status sshd— running, banning?ss -tlnp— only expected ports listening?apt list --upgradable— outstanding security patches?- File permissions on /etc/shadow, /etc/sudoers
Caddy Specific
- TLS cert validity/expiry
- Reverse proxy rules — no unintended exposure
- Access logs — unusual patterns?
UDM-Pro Specific
- Firmware version — current?
- Port forwards — only intended ones
- IDS/IPS enabled and signatures current
- Connected clients — any unknown devices?
- Exposed management ports?
Baseline
First run establishes baseline files at memory/security-baselines/:
zurich-keys.txt— authorized SSH keyszurich-ports.txt— expected listening portszurich-users.txt— expected users- Same for amsterdam, caddy, prod
Reporting
- Clean scan → log to
memory/security-scans/YYYY-MM-DD.md - Any findings → Fully alert (warning/critical) + detailed log
- Track trends (ban count, failed login volume)