Skip to content

A crafty lil script that will help deploy most best security practices to date on your VPS.

Notifications You must be signed in to change notification settings

0xXyc/VPS-Lock-Figuration

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

💻 VPS-Lock-Figuration ~ Designed to Configure your VPS with a Locked Tight Configuration 🔐

image

✅ Deploy VPS Best Practices in the Click of a few Buttons!! 🤓

This is a neat little BASH script that should be ran immediately after your VPS boots up the first time. It will help deploy most known best security practices to date. Ultimately, helping you maintain and start off with a secure environment for your VPS!

Best Practices Deployed 📋

  1. Update system packages
  2. Create a new user with sudo privileges.
  3. Set up a firewall using UFW to allow only inbound SSH on port 13337 (by default) .
  4. Disable root login and password authentication via SSH.
  5. Install and configure Fail2Ban.
  6. Enable automatic security updates.

🔥 Usage 🔥

Be sure to have a secure way to transfer keys to and from the system. In most cases, it is easiest to use your initial root login credentials to create SSH keys for a new user, and then use ssh-copy-id to transfer the keys to the new user.

The default port is 13337, but be sure to change it in the lock-figuration.sh file if you want to use a different port.

Connecting to the VPS

ssh -p <port> -i <private_key_here> user@<server_address>

Future

Let me know if I should add anything else!

About

A crafty lil script that will help deploy most best security practices to date on your VPS.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages