Lynis is an extensible security
audit tool for computer systems running
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, w ...
,
FreeBSD,
macOS
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
,
OpenBSD,
Solaris, and other Unix derivatives. It assists
system administrators
A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
and security professionals with scanning a system and its security defenses, with the final goal being
system hardening.
[ ]
Software
The tool was created by Michael Boelen, the original author of
rkhunter as well as several special contributors and translators.
Lynis is available under the
GPLv3
The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses that guarantee end users the four freedoms to run, study, share, and modify the software. The license was the first copyleft for general u ...
license.
The software determines various system information, such as the specific OS type, kernel parameters, authentication and accounting mechanism, installed packages, installed
services
Service may refer to:
Activities
* Administrative service, a required part of the workload of university faculty
* Civil service, the body of employees of a government
* Community service, volunteer service for the benefit of a community or a p ...
, network configuration, logging and monitoring (e.g.
syslog-ng), cryptography (e.g.
SSL/TLS certificates) and installed malware scanners (e.g.
ClamAV or
rkhunter). Additionally, it will check the system for
configuration errors and security issues. By request of the auditor, those checks may conform to international standards such as
ISO 27001,
PCI-DSS 3.2 and
HIPAA
The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1 ...
.
The software also helps with fully automated or semi-automatic auditing, software patch management, evaluation of server hardening guidelines and
vulnerability
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally."
A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
/
malware scanning of Unix-based systems. It can be locally installed from most system
repositories, or directly started from disk, including USB stick, CD or DVD.
Audience
The intended audience is
auditor
An auditor is a person or a firm appointed by a company to execute an audit.Practical Auditing, Kul Narsingh Shrestha, 2012, Nabin Prakashan, Nepal To act as an auditor, a person should be certified by the regulatory authority of accounting and a ...
s, security specialists,
penetration test
A penetration test, colloquially known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. T ...
ers, and sometimes system/network administrators. Usually members of a
First Line of Defense within a company or larger organization tend to employ such audit tools. According to the official documentation, there is also a Lynis Enterprise version, available with support for more than 10 computer systems, providing malware scanning, intrusion detection and additional guidance for auditors.
Reception
In 2016, Lynis won an ''
InfoWorld
''InfoWorld'' (abbreviated IW) is an information technology media business. Founded in 1978, it began as a monthly magazine. In 2007, it transitioned to a web-only publication. Its parent company today is International Data Group, and its siste ...
'' Bossie Award.
See also
*
chkrootkit
*
Host-based intrusion detection system comparison Comparison of host-based intrusion detection system components and systems.
Free and open-source software
As per the Unix philosophy a good HIDS is composed of multiple packages each focusing on a specific aspect.
Proprietary software
Proprie ...
*
List of free and open-source software packages
This is a list of free and open-source software packages, computer software licensed under free software licenses and open-source licenses. Software that fits the Free Software Definition may be more appropriately called free software; the GNU ...
*
Kali Linux
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security.
Kali Linux has around 600 penetration-testing programs (tools), including Armitage (a ...
Kali tools, Lynis Package Description
/ref>
References
External links
*
Lynis on free(code)
*
{{DEFAULTSORT:Lynis
Free security software
Unix security-related software
Unix package management-related software
MacOS security software