Our Security Projects
Open-source security tools for Linux and Debian infrastructures, engineered to meet STIG, CIS, and FedRAMP compliance demands. Explore our comprehensive suite of cybersecurity solutions.
HARDN-XDRHARDN_DOCKERLinux & Container Hardening

HARDN-XDR
Key Features
- ✓Automated system hardening with guided, one-step configuration workflows
- ✓Continuous security monitoring powered by the LEGION daemon
- ✓Integrated Lynis, AIDE, and custom scanners for layered assessments
- ✓Network protection backed by Fail2ban and adaptive telemetry
- ✓Interactive GTK4 dashboard for live situational awareness
- ✓Enemy detection insights surfaced through SIEM-driven analytics
- ✓Service manager for orchestrating hardening runs and security tooling
Operational Overview
- ✓Launch workflows through the HARDN service manager to apply hardening controls and review telemetry
- ✓The native SIEM interface opens alongside the manager to visualize compliance status and threats in real time
- ✓Security tooling and module scripts remain available on-demand for targeted investigations
Service Manager Highlights
- ✓Centralizes control of HARDN modules within both CLI and GUI experiences
- ✓Generates compliance reports aligned with the Center for Internet Security standards
- ✓Provides administrators with actionable system data for monitoring and rapid response
Service Architecture
- ✓hardn.service applies and maintains hardened security configurations
- ✓legion-daemon.service persistently monitors for configuration drift and emerging threats

HARDN_DOCKER
Security Features
- ✓Automated CIS Docker 1.13.0 enforcement across daemon and containers
- ✓Docker Bench Security integration with built-in remediation scripts
- ✓Host hardening for the Docker daemon alongside container policy controls
- ✓FedRAMP-ready logging, monitoring, and evidence collection workflows
Key Security Measures
- ✓Non-root runtime (uid 10001) with user namespace remapping and no-new-privileges
- ✓AppArmor and seccomp profiles, resource limits, and read-only root filesystem
- ✓TLS-encrypted Docker daemon operations with audit logging for every event
Hardening Toolkit
- ✓/sources/compliance OpenSCAP checks and scheduled compliance monitoring
- ✓/sources/network intrusion detection and network policy enforcement
- ✓/sources/security core system configuration and integrity protection
Security Model
- ✓Build-time scripts apply and lock down every security control as root
- ✓Runtime workloads execute as hardened non-root services while policies persist
- ✓Sample BusyBox web app demonstrates how to drop in production workloads