This blog is complimentary to the talk I did on MoneroTopia 26. Find the slides for the talk here.
Effective security isn't about buying expensive tools—it's about covering the fundamentals consistently. The cybersecurity lifecycle breaks down into three key phases:
The best part? You can implement all of this with free and open source software. It costs $0 (except your time), and everything runs self-hosted and sovereign.
Fleet is a lightweight alternative to Wazuh/OSSEC—and honestly, most organizations don't need a full-blown SIEM anyway. Fleet provides:
Built on osquery, Fleet turns your endpoints into a queryable database. Want to know what processes are running across all your servers? That's a SQL query away.
As part of this work, I've converted Chainguard's osquery detection queries into a format that works with Fleet. These queries are maintained and updated periodically—check out RasterSec/fleetdm-osquery-defense-kit to use them.
Fleet gives you immediate visibility into your software inventory across all enrolled hosts:
Fleet policies let you enforce security baselines using SQL queries. For example, to ensure SSH is properly hardened:
SELECT 1
WHERE NOT EXISTS (
SELECT 1
FROM file_lines
WHERE path = '/etc/ssh/sshd_config'
AND (
line LIKE 'PasswordAuthentication yes%'
OR line LIKE 'PermitRootLogin yes%'
OR line LIKE 'PermitEmptyPasswords yes%'
)
);
Policies can trigger alerts and even automated remediation when hosts fall out of compliance.
Complement Fleet with these tools:
Stay informed by following:
Detection rules from RasterSec/fleetdm-osquery-defense-kit can catch common attack patterns:
nginx just spawn /bin/bash?sshd connecting to a suspicious IP at 3am?curl | bash/tmp or /dev/shmpython -c 'import socket,subprocess...'YARA allows you to find textual or binary patterns inside files. Combined with osquery, you can scan running processes for malware signatures:
SELECT yara.*, p0.pid, p0.path, p0.name
FROM processes p0 JOIN yara ON p0.path = yara.path
WHERE yara.sigrule = '
rule miner {
strings:
$tcp = "stratum+tcp://" ascii
$tls = "stratum+tls://" ascii
condition:
filesize < 10MB and 1 of them
}' AND yara.count > 0
This query finds cryptominer processes by looking for Stratum protocol strings—a common indicator of mining malware.
#Authentication & Access
Persistence Mechanisms
Process Forensics
Network Artifacts
File System
Software Inventory
Level up your setup with these additions:
We deliver comprehensive, real-world penetration tests across your applications and infrastructure. Challenge us to find the vulnerabilities before an attacker does.
RasterSec © 2026
Company Details
Digilol OÜ
Registry code: 16602787. Narva mnt 5, 10117 Tallinn, Estonia. VAT: EE102921058.
Digilol America LLC
75 E 3rd St, Ste 7, Sheridan, WY 82801, United States. OSS VAT: EU372081451.