Custom Security-Centric Linux Platform with Automated Build Infrastructure, Kernel-Level Hardening, and CIS-Aligned Secure Deployment
Ms. S. Saranya
Assistant Professor, Dept. of CSE (Cyber Security)
Dr. Mahalingam College of Engineering and Technology
Pollachi, India saran38cse@gmail.com
Mr. Vivekanandan P
Professor, Dept. of CSE
(Cyber Security)
Dr. Mahalingam College of Engineering and Technology
Pollachi, India
drpvivekanandan@gmail.com
Mr. Salimul Hashir S
Dept. of CSE (Cyber Security)
Dr. Mahalingam College of Engineering and Technology
Pollachi, India salimulhashir2004@gmail.com
Mr. Hariharan P
Dept. of CSE (Cyber Security)
Dr. Mahalingam College of Engineering and Technology
Pollachi, India hari260005@gmail.com
Mr. Saravana Kumar S
Assistant Professor,
Dept. of CSE (Cyber Security)
Dr. Mahalingam College of Engineering and Technology
Pollachi, India
saravanacs84@gmail.com
Abstract— Modern Linux distributions offer flexibility and performance but often lack security-by-default configurations, making systems vulnerable to misconfigurations, privilege escalation, and post-deployment attacks. While existing security-focused solutions rely heavily on manual hardening or post-installation controls, they frequently fail to provide consistent compliance, reproducibility, and kernel-level protection. To address these limitations, this work proposes a custom security-centric Linux platform that integrates automated build infrastructure, kernel-level hardening, and CIS benchmark–aligned secure deployment within a unified security-by-design framework.
The proposed system is built from a minimal Linux base and employs an automated build pipeline to enforce secure package management, deterministic system configuration, and reproducible deployments. Kernel-level protections are incorporated through Linux Security Modules (LSMs), attack surface reduction, sysctl tuning, memory protection mechanisms, and compiler-based hardening. Additionally, CIS benchmark recommendations are translated into build-time policies covering user management, filesystem permissions, service minimization, logging, and network security. Experimental evaluation demonstrates a significantly reduced attack surface and high CIS compliance with minimal performance overhead compared to standard Linux installations. The proposed platform provides a scalable, auditable, and efficient foundation for secure enterprise, cloud, and cybersecurity-focused operating system deployments.
Keywords— Security-Centric Linux, Kernel Hardening, CIS Benchmarks, Automated Build Infrastructure, Secure Operating Systems, Develops (key words)