ansible-collection-hardening
by
dev-sec

Description: This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL

View dev-sec/ansible-collection-hardening on GitHub ↗

Summary Information

Updated 1 hour ago
Added to GitGenius on January 14th, 2026
Created on May 4th, 2015
Open Issues/Pull Requests: 74 (+0)
Number of forks: 817
Total Stargazers: 5,231 (+1)
Total Subscribers: 121 (+0)
Detailed Description

The `dev-sec/ansible-collection-hardening` repository provides a comprehensive Ansible collection designed to automate the hardening of various operating systems and services. It aims to improve the security posture of systems by applying industry best practices and security benchmarks, such as those from CIS (Center for Internet Security) and DISA STIGs (Defense Information Systems Agency Security Technical Implementation Guides). This collection offers a modular and flexible approach to security automation, allowing users to tailor hardening configurations to their specific needs and environments.

The core functionality of the collection revolves around a set of Ansible roles, each focusing on a specific area of system hardening. These roles cover a wide range of security aspects, including user account management, file system security, network configuration, logging and auditing, and service hardening. Each role typically includes tasks to configure settings, install necessary packages, and verify compliance with security standards. The collection is designed to be idempotent, meaning that running the playbooks multiple times will only make changes if the system deviates from the desired state, ensuring consistent and repeatable hardening across all managed hosts.

The collection supports a variety of operating systems, including Debian, Ubuntu, CentOS, Red Hat Enterprise Linux (RHEL), and SUSE. This broad compatibility makes it a valuable tool for organizations with diverse infrastructure. The roles are designed to be easily customizable through variables, allowing users to define specific security policies, such as password complexity requirements, allowed SSH protocols, and firewall rules. This flexibility enables users to adapt the hardening configurations to meet their unique security requirements and compliance obligations.

A key feature of the collection is its focus on compliance. The roles often include tasks to verify the system's compliance with specific security benchmarks. This is typically achieved through the use of auditd rules and other tools to check for deviations from the desired security configuration. The collection also provides reports and dashboards to visualize the compliance status of managed hosts, making it easier to identify and remediate security vulnerabilities. This reporting capability is crucial for maintaining a strong security posture and demonstrating compliance to auditors.

The `dev-sec/ansible-collection-hardening` repository is actively maintained and updated to reflect the latest security threats and best practices. The project benefits from a strong community, with contributions from security professionals and Ansible experts. This collaborative approach ensures that the collection remains up-to-date and effective in addressing evolving security challenges. The collection's modular design, extensive documentation, and focus on compliance make it a powerful and user-friendly tool for automating system hardening and improving overall security posture. It simplifies the complex process of securing systems, allowing organizations to focus on their core business objectives while maintaining a strong security defense.

ansible-collection-hardening
by
dev-secdev-sec/ansible-collection-hardening

Repository Details

Fetching additional details & charts...