更新与自动安全补丁
sudo apt update && sudo apt upgradesudo apt install unattended-upgradessudo dpkg-reconfigure unattended-upgrades(按向导启用)/etc/apt/apt.conf.d/50unattended-upgrades,确保包含:Unattended-Upgrade::Allowed-Origins {"${distro_id}:${distro_codename}-security";};/etc/apt/apt.conf.d/20auto-upgrades,启用每日检查与自动升级:APT::Periodic::Update-Package-Lists "1";APT::Periodic::Download-Upgradeable-Packages "1";APT::Periodic::AutocleanInterval "7";APT::Periodic::Unattended-Upgrade "1";cat /var/log/unattended-upgrades/unattended-upgrades.log防火墙与端口管控(UFW)
sudo ufw enable(默认策略通常为拒绝入站、允许出站)sudo ufw allow 22/tcp(SSH),sudo ufw allow 80,443/tcp(HTTP/HTTPS)sudo ufw allow from 203.0.113.10 to any port 22sudo ufw status numbered,sudo ufw delete <编号>SSH 安全加固
/etc/ssh/sshd_config:
Port 2222(可选:更改默认端口)PermitRootLogin noPasswordAuthentication no(使用密钥登录)sudo systemctl restart sshd运行时强制访问控制与恶意流量阻断
sudo aa-enable /etc/apparmor.d/usr.sbin.sshd)sudo apt install fail2ban/var/log/auth.log、/var/log/syslog,必要时结合集中日志平台/var/log/auth.log、/var/log/syslog 等日志,定位入侵路径与影响范围。apt list --upgradable,定期运行 Lynis 等安全基线工具,开展攻防演练与安全意识培训。