{"id":189,"date":"2026-05-02T02:00:51","date_gmt":"2026-05-02T00:00:51","guid":{"rendered":"https:\/\/eryann.fr\/?p=189"},"modified":"2026-05-02T14:08:17","modified_gmt":"2026-05-02T12:08:17","slug":"fiche-audit-securite-avec-lynis","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/","title":{"rendered":"Fiche audit s\u00e9curit\u00e9 avec Lynis"},"content":{"rendered":"\n<p>Lynis est un outil d\u2019audit de s\u00e9curit\u00e9 pour syst\u00e8mes Linux.<br>Il permet d\u2019identifier les faiblesses de configuration et de proposer des actions correctives.<\/p>\n\n\n\n<p>L\u2019objectif pour un \u00e9tudiant en BTS CIEL ou SIO est de :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>comprendre les r\u00e9sultats de l\u2019audit<\/li>\n\n\n\n<li>corriger les vuln\u00e9rabilit\u00e9s principales<\/li>\n\n\n\n<li>atteindre un niveau de s\u00e9curit\u00e9 coh\u00e9rent avec un environnement professionnel<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>ATTENTION : ce document est fait dans un but p\u00e9dagogoique, tout durcissmeent d&rsquo;une machine en production doit \u00eatre r\u00e9alis\u00e9 par un professionel.<\/p>\n\n\n\n<p>Les \u00e9l\u00e9ments pr\u00e9sents dans cette fiches sont insufisants pour prot\u00e9ger la machine. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Audit avec Lynis <\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># INSTALLATION<br>apt update &amp;&amp; apt install lynis -y<br><br># AUDIT COMPLET<br>lynis audit system<br><br># MODES UTILES<br>lynis audit system --quick<br>lynis audit system --quiet<br>lynis audit system --tests-from-group authentication,networking<br><br># RAPPORT<br>cat \/var\/log\/lynis-report.dat<br>cat \/var\/log\/lynis.log<br><br># SCORE<br>grep hardening_index \/var\/log\/lynis-report.dat<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Explication du fonctionnement<\/h2>\n\n\n\n<p>Lynis r\u00e9alise une s\u00e9rie de tests sur le syst\u00e8me :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>analyse des services actifs<\/li>\n\n\n\n<li>v\u00e9rification des configurations r\u00e9seau<\/li>\n\n\n\n<li>contr\u00f4le de la s\u00e9curit\u00e9 SSH<\/li>\n\n\n\n<li>v\u00e9rification des permissions<\/li>\n\n\n\n<li>analyse des journaux<\/li>\n<\/ul>\n\n\n\n<p>Le r\u00e9sultat se compose de :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>warnings : probl\u00e8mes importants \u00e0 corriger<\/li>\n\n\n\n<li>suggestions : am\u00e9liorations possibles<\/li>\n<\/ul>\n\n\n\n<p>Le score final (hardening index) permet d\u2019\u00e9valuer le niveau global de s\u00e9curit\u00e9.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Objectif <\/h2>\n\n\n\n<p>Un syst\u00e8me correctement configur\u00e9 doit atteindre :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>minimum : 70<\/li>\n\n\n\n<li>bon niveau : 80<\/li>\n\n\n\n<li>niveau avanc\u00e9 : 90<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Durcissement du syst\u00e8me<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Mise \u00e0 jour automatique<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install unattended-upgrades -y<br>dpkg-reconfigure unattended-upgrades<\/code><\/pre>\n\n\n\n<p>Explication :<br>Permet d\u2019installer automatiquement les mises \u00e0 jour de s\u00e9curit\u00e9.<br>C\u2019est essentiel car la majorit\u00e9 des attaques exploitent des failles connues d\u00e9j\u00e0 corrig\u00e9es.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">2. S\u00e9curisation SSH<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>nano \/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>Port 2222<br>PermitRootLogin no<br>PasswordAuthentication no<br>AllowUsers adminsys<br>MaxAuthTries 3<br>LoginGraceTime 30<br>ClientAliveInterval 300<br>ClientAliveCountMax 2<\/code><\/pre>\n\n\n\n<p>Explication :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>changement de port r\u00e9duit les scans automatis\u00e9s<\/li>\n\n\n\n<li>interdiction du compte root limite les attaques<\/li>\n\n\n\n<li>d\u00e9sactivation des mots de passe impose l\u2019usage de cl\u00e9s SSH<\/li>\n\n\n\n<li>limitation des tentatives r\u00e9duit le brute force<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">3. Protection avec fail2ban<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install fail2ban -y<br>cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<br>nano \/etc\/fail2ban\/jail.local<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;DEFAULT]<br>bantime = 1h<br>findtime = 10m<br>maxretry = 5<br>ignoreip = 127.0.0.1\/8 192.168.1.0\/24<br><br>&#91;sshd]<br>enabled = true<br>port = 2222<br>maxretry = 3<br>bantime = 2h<\/code><\/pre>\n\n\n\n<p>Explication :<br>Fail2ban surveille les logs et bloque automatiquement les adresses IP qui \u00e9chouent plusieurs fois \u00e0 se connecter.<br>Sans configuration, il est inutile. Il doit \u00eatre adapt\u00e9 au service prot\u00e9g\u00e9.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">4. Mise en place d\u2019un pare-feu<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ufw enable<br>ufw default deny incoming<br>ufw allow 2222\/tcp<\/code><\/pre>\n\n\n\n<p>Explication :<br>Le pare-feu bloque tout par d\u00e9faut et n\u2019autorise que les services n\u00e9cessaires.<br>Cela r\u00e9duit fortement la surface d\u2019attaque.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">5. V\u00e9rification des ports ouverts<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ss -tuln<\/code><\/pre>\n\n\n\n<p>Explication :<br>Permet d\u2019identifier les services expos\u00e9s.<br>Tout port inutile doit \u00eatre ferm\u00e9.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">6. D\u00e9sactivation des services inutiles<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl list-units --type=service<br>systemctl disable nom_service<\/code><\/pre>\n\n\n\n<p>Explication :<br>Chaque service actif repr\u00e9sente un risque potentiel.<br>Il faut limiter au strict n\u00e9cessaire.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">7. Gestion des logs<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>journalctl -xe<br>tail -f \/var\/log\/auth.log<\/code><\/pre>\n\n\n\n<p>Explication :<br>Les logs permettent de d\u00e9tecter :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>tentatives d\u2019intrusion<\/li>\n\n\n\n<li>erreurs syst\u00e8me<\/li>\n\n\n\n<li>anomalies<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">8. Rotation des logs<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install logrotate -y<br>nano \/etc\/logrotate.conf<\/code><\/pre>\n\n\n\n<p>Explication :<br>\u00c9vite la saturation du disque et garantit la conservation des journaux importants.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">9. S\u00e9curisation des comptes<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>cat \/etc\/passwd<\/code><\/pre>\n\n\n\n<p>Explication :<br>Il faut :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>supprimer les comptes inutiles<\/li>\n\n\n\n<li>limiter les privil\u00e8ges<\/li>\n\n\n\n<li>contr\u00f4ler les acc\u00e8s<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">10. Permissions des fichiers sensibles<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>chmod 700 ~\/.ssh<br>chmod 600 ~\/.ssh\/authorized_keys<\/code><\/pre>\n\n\n\n<p>Explication :<br>Emp\u00eache l\u2019acc\u00e8s non autoris\u00e9 aux cl\u00e9s SSH et aux fichiers critiques.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">11. S\u00e9curit\u00e9 kernel<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>nano \/etc\/sysctl.conf<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>net.ipv4.conf.all.rp_filter=1<br>net.ipv4.icmp_echo_ignore_broadcasts=1<br>net.ipv4.tcp_syncookies=1<\/code><\/pre>\n\n\n\n<p>Explication :<br>Renforce la protection contre :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>spoofing IP<\/li>\n\n\n\n<li>attaques r\u00e9seau<\/li>\n\n\n\n<li>flood SYN<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">12. V\u00e9rification des fichiers SUID<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>find \/ -perm -4000 2&gt;\/dev\/null<\/code><\/pre>\n\n\n\n<p>Explication :<br>Les fichiers SUID peuvent \u00eatre utilis\u00e9s pour escalader les privil\u00e8ges.<br>Ils doivent \u00eatre contr\u00f4l\u00e9s r\u00e9guli\u00e8rement.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">13. V\u00e9rification des droits sudo<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>cat \/etc\/sudoers<\/code><\/pre>\n\n\n\n<p>Explication :<br>Permet de contr\u00f4ler qui peut ex\u00e9cuter des commandes en tant qu\u2019administrateur.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">M\u00e9thode de travail<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>lancer un audit Lynis<\/li>\n\n\n\n<li>analyser les warnings<\/li>\n\n\n\n<li>corriger les points critiques<\/li>\n\n\n\n<li>relancer l\u2019audit<\/li>\n\n\n\n<li>v\u00e9rifier l\u2019am\u00e9lioration du score<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Lynis est un outil d\u2019audit, pas une solution de s\u00e9curit\u00e9 en lui-m\u00eame.<br>La s\u00e9curit\u00e9 repose sur :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>la mise \u00e0 jour du syst\u00e8me<\/li>\n\n\n\n<li>la configuration des services<\/li>\n\n\n\n<li>la r\u00e9duction de la surface d\u2019attaque<\/li>\n\n\n\n<li>la surveillance des logs<\/li>\n<\/ul>\n\n\n\n<p>Un syst\u00e8me correctement durci est :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>maintenu \u00e0 jour<\/li>\n\n\n\n<li>filtr\u00e9<\/li>\n\n\n\n<li>contr\u00f4l\u00e9<\/li>\n\n\n\n<li>surveill\u00e9<\/li>\n<\/ul>\n\n\n\n<p><audio autoplay=\"\"><\/audio><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lynis est un outil d\u2019audit de s\u00e9curit\u00e9 pour syst\u00e8mes Linux.Il permet d\u2019identifier les faiblesses de configuration et de proposer des actions correctives. L\u2019objectif pour un \u00e9tudiant en BTS CIEL ou SIO est de : ATTENTION : ce document est fait dans un but p\u00e9dagogoique, tout durcissmeent d&rsquo;une machine en production doit \u00eatre r\u00e9alis\u00e9 par un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12,10],"tags":[],"class_list":["post-189","post","type-post","status-publish","format-standard","hentry","category-linux","category-reseau"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche audit s\u00e9curit\u00e9 avec Lynis - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche audit s\u00e9curit\u00e9 avec Lynis - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Lynis est un outil d\u2019audit de s\u00e9curit\u00e9 pour syst\u00e8mes Linux.Il permet d\u2019identifier les faiblesses de configuration et de proposer des actions correctives. L\u2019objectif pour un \u00e9tudiant en BTS CIEL ou SIO est de : ATTENTION : ce document est fait dans un but p\u00e9dagogoique, tout durcissmeent d&rsquo;une machine en production doit \u00eatre r\u00e9alis\u00e9 par un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-02T00:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T12:08:17+00:00\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Fiche audit s\u00e9curit\u00e9 avec Lynis\",\"datePublished\":\"2026-05-02T00:00:51+00:00\",\"dateModified\":\"2026-05-02T12:08:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/\"},\"wordCount\":588,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"articleSection\":[\"Linux\",\"R\u00e9seau\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/\",\"name\":\"Fiche audit s\u00e9curit\u00e9 avec Lynis - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"datePublished\":\"2026-05-02T00:00:51+00:00\",\"dateModified\":\"2026-05-02T12:08:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-audit-securite-avec-lynis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche audit s\u00e9curit\u00e9 avec Lynis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche audit s\u00e9curit\u00e9 avec Lynis - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/","og_locale":"fr_FR","og_type":"article","og_title":"Fiche audit s\u00e9curit\u00e9 avec Lynis - Eryann Breizh SecOps","og_description":"Lynis est un outil d\u2019audit de s\u00e9curit\u00e9 pour syst\u00e8mes Linux.Il permet d\u2019identifier les faiblesses de configuration et de proposer des actions correctives. L\u2019objectif pour un \u00e9tudiant en BTS CIEL ou SIO est de : ATTENTION : ce document est fait dans un but p\u00e9dagogoique, tout durcissmeent d&rsquo;une machine en production doit \u00eatre r\u00e9alis\u00e9 par un [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-02T00:00:51+00:00","article_modified_time":"2026-05-02T12:08:17+00:00","author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Fiche audit s\u00e9curit\u00e9 avec Lynis","datePublished":"2026-05-02T00:00:51+00:00","dateModified":"2026-05-02T12:08:17+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/"},"wordCount":588,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"articleSection":["Linux","R\u00e9seau"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/","url":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/","name":"Fiche audit s\u00e9curit\u00e9 avec Lynis - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"datePublished":"2026-05-02T00:00:51+00:00","dateModified":"2026-05-02T12:08:17+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-audit-securite-avec-lynis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Fiche audit s\u00e9curit\u00e9 avec Lynis"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":1,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"predecessor-version":[{"id":192,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/189\/revisions\/192"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}