Docs / Security / How to Perform a Basic Security Audit on Your Server

How to Perform a Basic Security Audit on Your Server

By Admin · Mar 1, 2026 · Updated Apr 23, 2026 · 27 views · 2 min read

How to Perform a Basic Security Audit on Your Server

Regular security audits help identify vulnerabilities before attackers exploit them. Run these checks on your Breeze at least monthly to maintain a strong security posture.

Check for Open Ports

# Scan for listening services
sudo ss -tulnp

# External port scan from another machine
nmap -sV your-breeze-ip

Close any ports you do not actively need by updating your firewall rules.

Review User Accounts and Privileges

# List all users with login shells
awk -F: '$7 !~ /nologin|false/ {print $1}' /etc/passwd

# Check for users with UID 0 (root-level)
awk -F: '$3 == 0 {print $1}' /etc/passwd

# Review sudo group membership
getent group sudo

Inspect Running Processes and Cron Jobs

# Look for unexpected processes
ps aux --sort=-%mem | head -20

# List all cron jobs for all users
for user in $(cut -f1 -d: /etc/passwd); do
  crontab -u "$user" -l 2>/dev/null
done

Check for Outdated Packages

sudo apt update
apt list --upgradable

File Permission Audit

# Find world-writable files
find / -xdev -type f -perm -0002 -ls 2>/dev/null

# Find SUID/SGID binaries
find / -xdev \( -perm -4000 -o -perm -2000 \) -type f -ls 2>/dev/null

Document your findings and remediate issues promptly. Automate recurring checks with a cron job that emails results to your security team.

Was this article helpful?