Why I No Longer Trust “Secure by Default” in Linux Server Installs | by Faruk Ahmed | Jul, 2025
Faruk

Faruk @cyberwebpen

About: InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined:
Apr 27, 2025

Why I No Longer Trust “Secure by Default” in Linux Server Installs | by Faruk Ahmed | Jul, 2025

Publish Date: Aug 1
1 0

Member-only story

Why I No Longer Trust “Secure by Default” in Linux Server Installs

--

Share

Intro

We all love the idea of a “secure by default” Linux distribution — something we can install and immediately feel safe running. But after auditing dozens of servers, I’ve learned this idea can be dangerously misleading. Even popular distributions like Ubuntu and CentOS come with default settings that can leave you exposed.

Let me walk you through why I stopped trusting this myth — and what I do instead.

1. Open Ports You Didn’t Ask For

Right after a fresh install, I ran a quick ss -tuln and was surprised to see several services already listening.

Most Linux distros install services like Avahi, cups, or even rpcbind by default — services that are often unnecessary and may become attack surfaces.

✅ What I Do Now:

  • I run sudo ss -tuln and sudo netstat -plnt right after install.
  • Then I shut down and disable anything I don’t recognize:
  • sudo systemctl stop avahi-daemon sudo systemctl disable avahi-daemon

2. SSH Settings Are Too Permissive

On one server, I found SSH was enabled for password login and root login — both of which are…


👉 Read Full Blog on Medium Here

Comments 0 total

    Add comment