Lynis | |
Ver Layout: | simple |
Genre: | Security Software, Audit tool |
License: | GNU GPLv3 |
Latest Release Version: | 3.0.9 |
Latest Release Date: | [1] |
Operating System: | FreeBSD, Linux, macOS, OpenBSD, Solaris |
Programming Language: | Shell script |
Author: | Michael Boelen |
Developer: | CISOfy |
Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives. It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening.[2]
The tool was created by Michael Boelen, the original author of rkhunter as well as several special contributors and translators.[3] Lynis is available under the GPLv3 license.
The software determines various system information, such as the specific OS type, kernel parameters, authentication and accounting mechanism, installed packages, installed services, network configuration, logging and monitoring (e.g. syslog-ng), cryptography (e.g. SSL/TLS certificates) and installed malware scanners (e.g. ClamAV or rkhunter). Additionally, it will check the system for configuration errors and security issues. By request of the auditor, those checks may conform to international standards such as ISO 27001, PCI-DSS 3.2 and HIPAA.
The software also helps with fully automated or semi-automatic auditing, software patch management, evaluation of server hardening guidelines and vulnerability/malware scanning of Unix-based systems. It can be locally installed from most system repositories, or directly started from disk, including USB stick, CD or DVD.[4]
The intended audience is auditors, security specialists, penetration testers, and sometimes system/network administrators. Usually members of a First Line of Defense within a company or larger organization tend to employ such audit tools. According to the official documentation, there is also a Lynis Enterprise version, available with support for more than 10 computer systems, providing malware scanning, intrusion detection and additional guidance for auditors.[5]