Instructions: Copy this file to
private/servers/<hostname>/AUDIT_REPORT.mdand fill in the details. Findings should use the severity levels: CRITICAL, HIGH, MEDIUM, LOW, INFO.
Hostname: <hostname>
IP: <ip address>
OS:
Kernel:
Web Server:
Audit Date:
Uptime:
Auditor:
2–3 sentences summarizing overall risk posture and the top findings.
Overall Risk Posture: [ CRITICAL / HIGH / MEDIUM / LOW ]
Issues that are actively exploitable or represent immediate serious risk.
- Detail:
- Evidence:
- Impact:
- Remediation:
Significant vulnerabilities that should be addressed within days.
- Detail:
- Recommendation:
Issues that increase attack surface or risk; address within 2–4 weeks.
- Detail:
- Recommendation:
Minor hardening improvements; address as time allows.
- Detail:
- Recommendation:
Observations and confirmations of good practices — no action needed.
- Detail:
SSH & Access
- SSH key-based auth only (
PasswordAuthentication no) - Root login disabled or key-only (
PermitRootLogin no/prohibit-password) - X11 forwarding disabled
- Non-root sudo admin user created and tested
- Root SSH login disabled after admin user confirmed
Firewall
- UFW active with default deny inbound
- Only required ports open (SSH port, 80, 443)
- No unexpected listening services
Intrusion Prevention
- fail2ban installed and running
- SSH jail active with appropriate thresholds
- Apache jails configured (if applicable)
Apache
-
ServerTokens Prodset -
ServerSignature Offset -
mod_headersenabled - Security headers applied (HSTS, X-Content-Type-Options, Referrer-Policy, CSP)
-
.git/.svnaccess blocked -
mod_statusdisabled or localhost-only -
Options -Indexeson all vhosts
System
- All pending security updates applied
- Unattended-upgrades active
- Kernel sysctl hardened (ICMP redirects, martian logging)
- No world-writable files in web roots
- No unexpected SUID binaries
TLS / Certificates
- Valid cert on all vhosts
- Auto-renewal working (
certbot renew --dry-run) - HSTS header set with appropriate max-age
Monitoring
- Log monitoring in place (Logwatch or equivalent)
- fail2ban alert notifications working
- Regular update reports scheduled
Additional observations, deferred items, or context.