Pre-Installation Requirements
Post-Installation Requirements
Verify SSH Access
Unless you’re doing everything physically connected to your server, you’ll need remote access so be sure SSH works.Test SSH connectivity before proceeding:
Keep System Updated
Keep your system up-to-date with the latest patches.For Debian-based systems:For RHEL-based systems:
Perform System-Specific Tasks
Make sure you perform any tasks specific to your setup:
- Configuring network - Set static IP if needed
- Configuring mount points in
/etc/fstab - Creating the initial user accounts
- Installing core software you’ll want like
man - Any other environment-specific configurations
Configure Email Alerts
Your server will need to be able to send e-mails so you can get important security alerts.
If you’re not setting up a full mail server, you can configure a simple MTA (Mail Transfer Agent) to relay through Gmail or another service. Check the guide’s section on Gmail and Exim4 configuration.
Review CIS Benchmarks
I would also recommend you read through the CIS Benchmarks before you start with this guide.
CIS Benchmarks
The Center for Internet Security (CIS) provides comprehensive, industry-trusted benchmarks for securing Linux systems.Recommendation: Go through this guide first and THEN CIS’s guide. That way their recommendations will trump anything in this guide.