In situation where one needs to setup a security hardened Debian operating system, you can run through a list of security checklist published by Debian Security Manual. This section guides you on securing the Debian operating system in order to deploy it to public use.
Unlike other sections, this section organizes the contents and details according to the Debian Security Manual and how
That's all about hardening security for Debian operating system.