This capstone synthesises all four Architect tracks into a complete enterprise hardening + HA blueprint. You will: audit CIS Level 2 compliance with Lynis, write an Ansible playbook to enforce all hardening controls, configure Prometheus + Alertmanager monitoring stubs, design a Pacemaker/HAProxy HA configuration, set up a LUKS-encrypted data volume, enforce AppArmor mandatory access control, configure comprehensive auditd rules and AIDE integrity monitoring, and produce a final JSON compliance report that scores all controls. This is the definitive Architect competency check.
=== Lynis Version ===
3.0.7
=== CIS Level 2 Baseline Scan ===
Hardening index : 60 [############ ]
Tests performed : 221
📸 Verified Output:
💡 Tip: CIS Level 2 target is Lynis hardening index ≥ 80. The gap from 60 to 80+ requires applying SSH hardening, PAM configuration, audit rules, and AppArmor enforcement.
Step 2 — Ansible Hardening Playbook
Build the Ansible playbook that enforces all CIS Level 2 controls:
# Get top hardening suggestions
lynis audit system --quick --no-colors --skip-plugins 2>&1 | \
grep "Suggestion" | head -15
Suggestion: Install a PAM module for password strength testing [AUTH-9262]
Suggestion: Configure minimum password age in /etc/login.defs [AUTH-9286]
Suggestion: Configure maximum password age in /etc/login.defs [AUTH-9286]
Suggestion: Default umask in /etc/profile or /etc/profile.d/custom.sh could be more strict [AUTH-9328]
Suggestion: To decrease the impact of a full /home file system, place /home on a separate partition [FILE-6310]
Suggestion: To decrease the impact of a full /tmp file system, place /tmp on a separate partition [FILE-6310]
Suggestion: Disable drivers like USB storage when not used [STRG-1840]
Suggestion: Check DNS configuration for the dns domain [NAME-4028]
Suggestion: Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
Suggestion: Add legal banner to /etc/issue.net [BANN-7128]
Suggestion: Enable sysstat to collect accounting (disabled) [ACCT-9626]
Suggestion: Enable process accounting [ACCT-9622]
Suggestion: Install debsums utility for the verification of packages with known good database [PKGS-7370]