8000 GitHub - AnonVortex/HARDN: A single Debian tool to fully secure an OS using automation, monitoring, heuristics and keeping availability high.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

A single Debian tool to fully secure an OS using automation, monitoring, heuristics and keeping availability high.

License

Notifications You must be signed in to change notification settings

AnonVortex/HARDN

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HARDN-XDR

HARDN Logo

The Linux Security Project for Debian Systems

Overview

HARDN is an endpoint security and hardening solution for Debian-based systems that provides:

  • System Hardening: Comprehensive security hardening following STIG compliance guidelines
  • Endpoint Management: Advanced monitoring, securing, and maintenance of network devices
  • STIG Compliance: Alignment with Security Technical Information Guides from the DOD Cyber Exchange
  • Automated Security: Real-time threat detection and response capabilities

Features

  • Comprehensive Monitoring: Real-time insights into endpoint performance and security status
  • Enhanced Security: Advanced security protocols and hardening measures
  • Scalability: Supports small to large-scale network deployments
  • STIG Compliance: Government-grade security for Debian-based information systems
  • Modular Architecture: Professional CLI interface with specialized security modules
  • REST API: HTTP API for integration and remote monitoring

Installation

Requirements

  • Debian 12 or Ubuntu 24.04 (bare-metal or virtual machines)
  • Root or sudo access for installation
  • Internet connection for package downloads

Installation Methods

1. Debian Package (Recommended)

Download and install the latest .deb package:

git clone https://github.com/Security-International-Group/HARDN-XDR.git
cd HARDN
dpkg-buildpackage -us -uc -b
sudo dpkg -i ../hardn_*.deb

What Gets Installed

HARDN-XDR provides a comprehensive security hardening suite:

  • Headless Operation: Full compatibility with VM and desktop deployments
  • STIG Compliance: Government-grade security hardening for Debian systems
  • Automated Security: Real-time threat detection and response capabilities
  • Modular Architecture: Professional CLI with specialized security modules
  • REST API: HTTP API for remote monitoring and integration
  • Package Management: Native .deb package with proper dependency management
  • System Integration: Systemd service support and FHS-compliant structure
  • Comprehensive Logging: Centralized logging with rotation and monitoring

Key security features:

  • Malware detection and signature-based response system
  • Advanced monitoring and reporting tools
  • System hardening following security best practices
  • Automated security updates and maintenance

For detailed information, see the Documentation Library and HARDN System Specifications.

Documentation

HARDN-XDR includes comprehensive documentation organized in a structured library:

All comprehensive documentation is organized in the /docs/library/ directory:

  • Usage Guide - Comprehensive guide for headless and interactive operation modes

Core Documentation Files

Architecture

HARDN-XDR follows a modular architecture with proper Linux filesystem hierarchy compliance:

Installation Structure

/usr/bin/hardn                    # Main executable
/usr/share/hardn/modules/         # Security modules
/usr/share/hardn/templates/       # Configuration templates  
/usr/share/man/man1/hardn.1       # Manual page
/etc/hardn/hardn.conf             # System configuration
/var/log/hardn/                   # Application logs
/var/lib/hardn/                   # Application data
/lib/systemd/system/             

Core Modules

  • logging.sh - Centralized logging with rotation
  • utils.sh - Common utilities and system checks
  • hardening.sh - Core security hardening and STIG implementation
  • audit.sh - Security scanning and compliance checking
  • status.sh - System monitoring and performance metrics
  • backup.sh - Configuration backup and restore
  • monitor.sh - Service management and real-time monitoring
  • update.sh - Security updates and signature maintenance
  • uninstall.sh - Clean removal and system restoration

Source Repository Structure

HARDN/
├── docs/                           # Documentation
│   ├── library/                    # Organized documentation library
│   │   ├── installation/           # Installation guides
│   │   ├── usage/                  # Usage documentation  
│   │   ├── security/               # Security & compliance docs
│   │   ├── development/            # Development & architecture
│   │   └── reference/              # Reference materials
│   ├── assets/                     # Images and diagrams
│   ├── README.md                   # Documentation overview
│   ├── TABLE_OF_CONTENTS.md        # Complete documentation index
│   ├── HARDN.md                    # System specifications
│   └── changelog.md                # Version history
├── debian/                         # Debian packaging
├── src/                           # Source code
├── systemd/                       # Service files
├── usr/                          # Installation files
├── install.sh                    # Quick install script
├── progs.csv                     # Package dependencies
└── README.md                     # This file

Build Process

For detailed build documentation, see docs/build-process.md
Quick Answer: Docker files are NOT needed for dpkg build - they're only used for testing.

HARDN uses a CI/CD pipeline with testing and quality assurance:

graph TD
    A[Source Code Push] --> B[Lint Stage]
    B --> B1[ShellCheck Validation]
    B --> B2[File Permissions Check]
    B --> B3[Debian Package Validation]
    
    B1 --> C[Build Stage]
    B2 --> C
    B3 --> C
    
    C --> C1[Install Build Dependencies]
    C --> 
A632
C2[Set up Package Structure]
    C --> C3[Build Debian Package]
    C --> C4[Package Content Verification]
    
    C1 --> D[Test Stage]
    C2 --> D
    C3 --> D
    C4 --> D
    
    D --> D1[Container Testing - Debian 12]
    D --> D2[Container Testing - Ubuntu 24.04]
    D --> D3[Package Installation Tests]
    D --> D4[CLI Functionality Tests]
    
    D1 --> E[Security Scan]
    D2 --> E
    D3 --> E
    D4 --> E
    
    E --> E1[Trivy Vulnerability Scan]
    E --> E2[SARIF Report Generation]
    E --> E3[GitHub Security Tab Upload]
    
    E1 --> F[Integration Tests]
    E2 --> F
    E3 --> F
    
    F --> F1[Full Package Installation]
    F --> F2[System Hardening Tests]
    F --> F3[Service Functionality Tests]
    F --> F4[Configuration Validation]
    
    F1 --> G[Release Stage]
    F2 --> G
    F3 --> G
    F4 --> G
    
    G --> G1[Version Extraction]
    G --> G2[GitHub Release Creation]
    G --> G3[Package Artifact Upload]
    
    style A fill:#e1f5fe
    style G3 fill:#c8e6c9
    style E1 fill:#fff3e0
    style D1 fill:#f3e5f5
    style D2 fill:#f3e5f5
    classDef testStage fill:#e8f5e8
    class D1,D2,D3,D4,F1,F2,F3,F4 testStage
Loading

Build Stages Explained

  1. Lint Stage: Code quality validation using ShellCheck, file permission verification, and Debian packaging structure validation
  2. Build Stage: Debian package compilation with proper dependency management and FHS compliance
  3. Test Stage: Multi-distribution testing in containerized environments (Debian 12, Ubuntu 24.04)
  4. Security Scan: Vulnerability assessment using Trivy with automated security reporting
  5. Integration Tests: End-to-end functionality testing with real system installation
  6. Release Stage: Automated GitHub releases with versioned artifacts for production deployment

Usage

Command Line Interface

HARDN-XDR supports fully headless operation:

# System hardening (headless mode)
sudo hardn setup --non-interactive

# Check system status  
hardn status

# Run security audit
hardn audit

# Monitor services
hardn monitor start

# View help and version
hardn --help
hardn --version

Advanced Usage

# Backup current configuration
hardn backup create

# Restore from backup
hardn backup restore

# Update security signatures
hardn update

# Clean uninstall
hardn uninstall

REST API

Start the HTTP API server for remote monitoring and integration:

# Start API server on localhost:8080
hardn api

# Start on custom port with full privileges
sudo hardn api --port 9090 --host 0.0.0.0

API endpoints:

  • GET /api/status - System status information
  • GET /api/services - Security services status
  • GET /api/metrics - Live system metrics
  • GET /api/logs - Security logs
  • POST /api/service - Control services

Quick Documentation Links

Getting Started

Administration

Development

License

This project is licensed under the MIT License.

Contact

For questions or support, contact: office@cybersynapse.ro

Project Partners

CyberSynapse Logo

About

A single Debian tool to fully secure an OS using automation, monitoring, heuristics and keeping availability high.

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Makefile 70.4%
  • Shell 26.7%
  • Rust 2.2%
  • Other 0.7%
0