feat(security): systemd service hardening implementation
Merge feature/systemd-hardening This merge introduces production-ready security hardening for the systemd service with 6 pragmatic security options: - ProtectSystem=strict for read-only filesystem - ReadWritePaths for required directories only - ProtectHome=yes to block home directory access - NoNewPrivileges=yes to prevent privilege escalation - PrivateTmp=yes for isolated temporary space - RestrictAddressFamilies=AF_INET for IPv4-only networking Testing completed successfully on: - Debian 12 (systemd 247) - Arch Linux (systemd 256) No performance impact observed (812K RAM usage). Closes DAW/furt#110
This commit is contained in:
commit
baa2490bbe
2 changed files with 16 additions and 1 deletions
|
|
@ -23,3 +23,4 @@ a670de0f,d271b84,refactor/extract-health-routes-and-server-core,2025-09-05T17:25
|
||||||
a670de0f,25a709e,feature/pid-file-service-management,2025-09-05T20:30:13Z,michael,git,lua-api
|
a670de0f,25a709e,feature/pid-file-service-management,2025-09-05T20:30:13Z,michael,git,lua-api
|
||||||
a670de0f,59f372f,feature/pid-file-service-management,2025-09-07T14:58:01Z,michael,git,lua-api
|
a670de0f,59f372f,feature/pid-file-service-management,2025-09-07T14:58:01Z,michael,git,lua-api
|
||||||
a670de0f,683d6e5,fix/validate-config-posix-regex,2025-09-07T16:00:48Z,michael,git,lua-api
|
a670de0f,683d6e5,fix/validate-config-posix-regex,2025-09-07T16:00:48Z,michael,git,lua-api
|
||||||
|
a670de0f,24bd94d,feature/systemd-hardening,2025-09-07T16:40:47Z,michael,git,lua-api
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=furt Multi-Tenant API Gateway
|
Description=furt Multi-Tenant API Gateway (Security-Hardened)
|
||||||
After=network.target
|
After=network.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
|
@ -14,6 +14,20 @@ RestartSec=5
|
||||||
StandardOutput=journal
|
StandardOutput=journal
|
||||||
StandardError=journal
|
StandardError=journal
|
||||||
|
|
||||||
|
# === SECURITY HARDENING ===
|
||||||
|
|
||||||
|
# Filesystem Protection
|
||||||
|
ProtectSystem=strict
|
||||||
|
ReadWritePaths=/var/run/furt /var/log/furt
|
||||||
|
ProtectHome=yes
|
||||||
|
|
||||||
|
# Process Hardening
|
||||||
|
NoNewPrivileges=yes
|
||||||
|
PrivateTmp=yes
|
||||||
|
|
||||||
|
# Network Restriction
|
||||||
|
RestrictAddressFamilies=AF_INET
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue