Security banner gallery - pyllyukko/harden.yml GitHub Wiki
Because why not :)
- https://linux-audit.com/the-real-purpose-of-login-banners-on-linux/
- https://www.redhat.com/sysadmin/more-lockdown-controls
- Eight ways to protect SSH access on your system: "Warning! Authorized use only. This server is the property of MyCompanyName.com"
- Lynis requires 5 or more of the following keywords: "audit access authori condition connect consent continu criminal enforce evidence forbidden intrusion law legal legislat log monitor owner penal policy policies privacy private prohibited record restricted secure subject system terms warning" in tests
BANN-7126
&BANN-7130
(see tests_banners)
system-hardening-10.2.txt
****************************************************************
Unauthorized access prohibited; all access and activities not
explicitly authorized by the administrator are unauthorized.
All activities are monitored and logged. There is no privacy
on this system. Unauthorized access and activities or any
criminal activity will be reported to appropriate authorities.
****************************************************************
/etc/lilo.conf menu-title: "Unauthorized Access Prohibited"
Slackware Linux Benchmark v1.1
issue:
*************************************************
NOTICE TO USERS
This is a private system and is the property of
[insert company name here]. It is for authorized
use only. Users (authorized or unauthorized) have
no explicit or implicit expectation of privacy.
Any or all uses of this system and all files on
this system may be intercepted, monitored,
recorded, copied, audited, inspected, and disclosed
to authorized site, and law enforcement
personnel, as well as authorized officials of
other agencies, both domestic and foreign. By
using this system, the user consents to such
interception, monitoring, recording, copying,
auditing, inspection, and disclosure at the
discretion of the authorized site.
Unauthorized or improper use of this system may
result in administrative disciplinary action and
civil and criminal penalties. By continuing to use
this system you indicate your awareness of and
consent to these terms and conditions of use. DO
NOT LOGIN if you do not agree to the conditions
stated in this warning.
**************************************************
motd:
*************************************************
NOTICE TO USERS
Use of this system constitutes consent to security
monitoring and testing. All activity is logged
with your host name and IP address.
*************************************************
Mastering Linux Security and Hardening
https://www.packtpub.com/product/mastering-linux-security-and-hardening/9781788620307
motd:
Warning: Authorized Users Only!
All others will be prosecuted.
Slackware Administrators Security tool kit (SAStk)
*****************************************************
This system is for the use of authorized users only.
All connections are Logged !!
Keyboard input will be monitored in the event
of a real or suspected security incident.
Use of this system constitutes understanding and
consent to the aforementioned monitoring.
*****************************************************
Bastille
***************************************************************************
NOTICE TO USERS
This computer system is the private property of $owner, whether
individual, corporate or government. It is for authorized use only.
Users (authorized or unauthorized) have no explicit or implicit
expectation of privacy.
Any or all uses of this system and all files on this system may be
intercepted, monitored, recorded, copied, audited, inspected, and
disclosed to your employer, to authorized site, government, and law
enforcement personnel, as well as authorized officials of government
agencies, both domestic and foreign.
By using this system, the user consents to such interception, monitoring,
recording, copying, auditing, inspection, and disclosure at the
discretion of such personnel or officials. Unauthorized or improper use
of this system may result in civil and criminal penalties and
administrative or disciplinary action, as appropriate. By continuing to use
this system you indicate your awareness of and consent to these terms
and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the
conditions stated in this warning.
****************************************************************************
CIS Debian Linux 10 Benchmark v1.0.0
GDM: "Authorized uses only. All activity may be monitored and reported."
Cisco
UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED
You must have explicit, authorized permission to access or configure this device.
Unauthorized attempts and actions to access or use this system may result in civil and/or
criminal penalties.
All activities performed on this device are logged and monitored.
5 ways to harden a new system with Ansible
https://www.redhat.com/sysadmin/harden-new-system-ansible
issue:
Use of this system is restricted to authorized users only, and all use is subjected to an acceptable use policy.
IF YOU ARE NOT AUTHORIZED TO USE THIS SYSTEM, DISCONNECT NOW.
motd:
THIS SYSTEM IS FOR AUTHORIZED USE ONLY
By using this system, you agree to be bound by all policies found at https://wiki.example.com/acceptable_use_policy.html. Improper use of this system is subject to civil and legal penalties.
All activities are logged and monitored.
PAM Mastery
:)
Your access to this host as %u has been logged.
Unauthorized users will be mercilessly
trampled by angry Luggage.
Tiger
----------------------------------------------------------------------
| * * * * * * * W A R N I N G * * * * * * * * * * |
| |
| THIS IS A PRIVATE SYSTEM. It is for authorized use only. |
| |
| This computer system including all related equipment, network |
| devices (specifically including Internet access), are provided |
| for AUTHORIZED USE ONLY. |
| |
| Users (authorized or unauthorized) have no explicit or implicit |
| expectation of privacy. |
| |
| Any or all uses of this system and all files on this system may |
| be intercepted, monitored, recorded, copied, audited, inspected, |
| and disclosed to authorized site and law enforcement personnel, |
| as well as authorized officials of other agencies, both domestic |
| and foreign. By using this system, the user consents to such |
| interception, monitoring, recording, copying, auditing, inspection,|
| and disclosure at the discretion of authorized site personnel. |
| |
| Unauthorized or improper use of this system may result in |
| administrative disciplinary action and civil and criminal |
| penalties. By continuing to use this system you indicate your |
| awareness of and consent to these terms and conditions of use. |
| LOG OFF IMMEDIATELY if you do not agree to the conditions stated |
| in this warning. |
| |
----------------------------------------------------------------------