SecureBaseline Cloud - CIS scanning and Linux hardening

SecureBaseline Cloud - CIS scanning and Linux hardening

SecureBaseline Cloud is a Hardening as a Service platform that automates CIS (Center for Internet Security) compliance scanning, vulnerability detection, and hardening for Linux servers. Available on Yandex Cloud, Azure Marketplace, AWS Marketplace, and DigitalOcean Marketplace.

What’s New in v1.2.3

LLM multi-provider support. 7 providers: YandexGPT, OpenAI, Azure OpenAI, Anthropic, AWS Bedrock, Google Vertex AI, and any OpenAI-compatible endpoint (Ollama, Mistral, vLLM). Inline test button, per-provider/model usage statistics, credential encryption (AES-256-GCM).

Modular prompt architecture. AI prompts extracted to YAML modules. Edit prompt behavior without recompilation.

must-gather diagnostic tool. CLI binary that collects system state, logs, configuration, SCAP content, and database statistics into a tar.gz archive for troubleshooting.

Host task exclusivity. Only one operation (scan, hardening, remediation) can run per host at a time. Concurrent requests return 409 Conflict.

Forced AI response language. AI assistant responds in the UI language (English or Russian), regardless of user input language.

What’s New in v1.2.2

Instant vulnerability scanning. CVE and OVAL databases are pre-installed in the image. The first scan starts immediately after deployment - no waiting for synchronization.

FSTEC BDU database with 74,000+ entries. For organizations operating under Russian information security standards, the full FSTEC threat and vulnerability database is integrated with automatic updates.

Improved automated remediation. Two-pass automated hardening increases CIS compliance from 67.7% to 78%. Every change is recorded in the audit log down to the individual rule level.

Russian Linux distributions. Added support for Astra Linux, RED OS, ALT Linux, Rosa Linux, OSnova, Simply Linux and other distributions based on Debian/RHEL families.

Multi-cloud deployment. Available on Yandex Cloud, Azure, AWS, and DigitalOcean with one-click deployment from marketplace listings.

Key Features

  • Compliance Scanning - automated server assessment against CIS Benchmarks
  • Vulnerability Scanning - CVE detection with pre-installed databases (NVD, OVAL, ExploitDB, MITRE ATT&CK, CISA KEV)
  • FSTEC BDU - Russian vulnerability database with 74,000+ entries, auto-synced every 24 hours
  • Security Hardening - automated application of CIS configurations with granular rule control
  • Automated Remediation - generate, review, and apply fixes for individual failed rules
  • Host Management - centralized management of Linux servers via SSH
  • Task Scheduling - automation of scanning and hardening using cron schedules
  • AI Diagnostics - analysis of hardening errors, task generation, and compliance coverage using LLM
  • Reporting - detailed reports in HTML, PDF, CSV, and JSON formats
  • Audit Logging - logging of all user actions and system events

Supported Operating Systems

FamilyDistributions
Ubuntu18.04, 20.04, 22.04, 24.04
Debian11, 12
RHELRHEL 7/8/9/10, CentOS 7/8/9, AlmaLinux 8/9, Rocky Linux 8/9
OracleOracle Linux 7, 8, 9, 10
AmazonAmazon Linux 2, 2023
FedoraFedora 37+
SUSESLES 15, openSUSE Leap
Astra LinuxAstra Linux SE (Debian-based)
RED OSRED OS (RHEL-based)
ALT LinuxALT Linux (RHEL-based)
Rosa LinuxRosa Linux (RHEL-based)
Other RUOSnova, Simply Linux

Security Profiles

Security profiles are automatically detected from installed SCAP content. Available profiles vary by OS.

ProfileDescriptionAvailability
CIS Level 1 - ServerBasic security hardeningAll supported OS
CIS Level 2 - ServerEnhanced security hardeningAll supported OS
CIS Level 1 - WorkstationBasic workstation securityAll supported OS
CIS Level 2 - WorkstationEnhanced workstation securityAll supported OS
DISA STIGSecurity Technical Implementation GuideRHEL, Ubuntu, SLES
PCI-DSSPayment Card Industry Data Security StandardRHEL, Ubuntu, Debian
HIPAAHealth Insurance Portability and Accountability ActRHEL, Ubuntu
OSPPOperating System Protection ProfileRHEL, Fedora, Ubuntu
ANSSI BP28French National Cybersecurity Agency (4 levels)RHEL, Ubuntu, Debian
E8Australian Essential EightRHEL, Ubuntu
ISM OfficialAustralian Information Security ManualRHEL
CCNSpanish National Cryptologic Center (3 levels)RHEL
CUIControlled Unclassified InformationRHEL
StandardBasic security profileAll supported OS

Deployment Options

CloudMarketplaceDeployment
Yandex CloudAll-in-OneSingle VM - all components
Yandex CloudClusterDistributed deployment with scaling
AzureAzure MarketplaceOne-click VM deployment
AWSAWS MarketplaceOne-click VM deployment
DigitalOceanDO MarketplaceDroplet 1-Click

Documentation Sections

SectionDescription
SSH CredentialsManage SSH keys and passwords for connecting to servers
Security HardeningApply CIS Benchmark rules via Ansible playbooks with granular control
Vulnerability ScanningDetect CVEs and FSTEC BDU vulnerabilities in installed packages
RemediationGenerate and approve Ansible scripts to fix compliance failures
Task GeneratorAI-powered Ansible task generation from CIS rule descriptions
Coverage AnalysisAI-powered evaluation of CIS rule coverage in your Ansible roles
TroubleshootingDiagnose SSH, scanning, hardening, and platform issues

Related Sections

Reviewed by OpenNix LLC · Last updated on