Makaveli81

Hardening Linux automatisé avec Ansible — conformité ANSSI BP-028 (niveaux M/I/R/E). Durcissement système, réseau, SSH, utilisateurs + audit avec rapport Markdown.

15
1
100% credibility
Found Apr 13, 2026 at 15 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Jinja
AI Summary

A toolkit that automatically checks and strengthens the security of Debian and Ubuntu Linux systems based on official French government guidelines.

How It Works

1
🔍 Find the Linux safety guide

You discover a free toolkit that helps make your Debian or Ubuntu Linux computers safer by following official expert recommendations.

2
📥 Download and set up

You grab the toolkit onto your computer and make a simple list of the Linux machines you want to check or protect.

3
Choose your path
📋
Check safety first

Run a quick scan to see how secure things are right now and get a score.

🛡️
Apply protections

Let it automatically strengthen your computer's defenses step by step.

4
🚀 Run the safety boost

Hit the start button, and it safely scans or upgrades your Linux machine over the internet connection—you can watch the progress.

5
📊 Review your report

Get an easy-to-read summary showing your security score, what's good, and what got fixed.

Your Linux is secure!

Your computer now meets high safety standards, protected against common threats with proof in your report.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 15 to 15 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is ansible-linux-hardening?

This Ansible playbook automates Linux hardening for Debian 12/13 and Ubuntu 22.04/24.04 servers, applying ANSSI BP-028 guidelines across system tweaks, network restrictions, SSH configs, user policies, and package management. Run the hardening playbook to lock down your setup, then use the audit playbook for Markdown reports with compliance scores—perfect for before/after checks on fresh installs.

Why is it gaining traction?

It bundles hardening and auditing into one package, spitting out GitHub-ready Markdown reports with pass/fail details and percentages, unlike bare CIS linux hardening ansible playbooks that leave reporting to you. Tags let you apply minimal or intermediate levels selectively, with auto security updates via unattended-upgrades and UFW firewall enabling out of the box. French orgs dig the ANSSI focus over generic github hardening linux options.

Who should use this?

DevOps teams hardening linux server ubuntu or debian linux hardening for compliance audits. Sysadmins securing internal Debian tools or Ubuntu VMs without endless sysctl edits. French gov contractors targeting ANSSI BP-028 for production fleets.

Verdict

Worth a spin for Debian/Ubuntu ansible linux hardening playbook needs—docs include real audit samples and syntax checks. At 15 stars and 1.0% credibility, it's early; test on staging as higher ANSSI levels (R/E) and PDF reports are planned.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.