Debian Security · Bullseye & Bookworm

Debian server security
without the complexity

Debian is built for stability, not security automation. No UFW, no unattended-upgrades, no default firewall rules. Defensia fills those gaps with one command — zero configuration required.

Install on Debian in 30 seconds

Why Debian servers need automated security

Debian's philosophy is stability and minimalism. A fresh Debian install ships with no firewall frontend, no automatic security updates, and no intrusion detection. That's intentional — Debian trusts you to configure what you need. But on an internet-facing server, "secure by default" is not the same as "secure in practice."

What Debian ships without

No UFW — Debian uses raw iptables/nftables. No friendly firewall frontend out of the box
No unattended-upgrades — security patches require manual apt update && apt upgrade
No fail2ban — no SSH brute force protection unless you install and configure it yourself
No intrusion detection — no rkhunter, no AIDE, no chkrootkit pre-installed
AppArmor inactive — installed but not enforcing profiles on most services by default

What Debian gets right

Minimal attack surface — no unnecessary packages, no snap, no desktop components on server installs
Stable release cycle — 2-year release cadence with 5 years of security support (3 + 2 LTS)
Proven package vetting — packages go through unstable, testing, and stable before reaching production
Strong community audit — one of the most audited open-source distributions with reproducible builds

Debian is the foundation of Ubuntu, but without Ubuntu's opinionated defaults. Experienced sysadmins choose Debian precisely because it doesn't add unnecessary packages. The tradeoff: you need to add your own security layer. Defensia is that layer — lightweight, automatic, and aligned with Debian's no-bloat philosophy. For a broader view of Linux server protection, see Linux server security.

Manual Debian hardening vs Defensia

Every Debian hardening guide tells you to do these steps manually. Defensia handles them automatically from the moment you install the agent.

Hardening stepManual on DebianDefensia
Firewall rules (iptables/nftables)Write rules manually or install UFW
SSH brute force protectionInstall + configure fail2ban jails
Web application firewallInstall + tune ModSecurity + OWASP CRS
Automatic security updatesInstall + configure unattended-upgradesCVE scanning
Package integrity verificationRun debsums manually
Rootkit detectionInstall + run rkhunter/chkrootkit
Malware scanningInstall ClamAV + write custom scripts
Service restart after updatesInstall + configure needrestartMonitored
Real-time attack dashboardNot available
Multi-server managementNot available

Manual hardening requires ongoing maintenance — rules drift, packages change, new CVEs appear daily. Defensia keeps everything in sync automatically. It replaces the need for fail2ban jail configuration entirely. See SSH brute force protection for details on how Defensia handles authentication attacks.

Install Defensia on Debian

One command. Works on Debian 11 Bullseye and Debian 12 Bookworm. No extra packages, no repositories to add, no dependencies to resolve. The agent is a single Go binary — no Python, no Ruby, no PHP runtime required.

Install on Debian (Bullseye / Bookworm)
$ curl -fsSL https://defensia.cloud/install.sh | sudo bash

What happens during installation

Downloads a single Go binary (< 15 MB) — no apt packages, no dependencies
Creates a systemd service (defensia-agent.service) with automatic restart
Auto-detects /var/log/auth.log for SSH monitoring
Auto-detects nginx and Apache access logs for WAF
Creates ipset sets for efficient IP blocking (65,000+ concurrent bans)
Connects to the Defensia dashboard — events appear within seconds
Starts protecting immediately — no configuration files to edit

The agent uses systemd for process management and ipset + iptables for blocking — both standard on Debian. No kernel modules, no eBPF, no custom firewalls. Unlike Ubuntu, Debian uses raw iptables/nftables instead of UFW, and Defensia works with both.

What Defensia detects on Debian servers

The agent auto-detects Debian log locations and system tools. No configuration needed — it knows where Debian keeps everything.

SSH authentication attacks

15 detection patterns: failed passwords, invalid users, pre-auth disconnects, PAM failures, kex negotiation errors, max auth attempts exceeded. Reads auth.log in real time.

/var/log/auth.log

Web application attacks (WAF)

15+ OWASP attack types: SQL injection, XSS, path traversal, RCE, SSRF, shellshock, XXE. Auto-detects nginx and Apache access logs including virtual hosts.

/var/log/nginx/access.log, /var/log/apache2/access.log

Malware and web shells

64,000+ hash signatures and 684 dynamic detection patterns. Finds PHP backdoors in upload directories, cryptominers in /tmp, reverse shells, obfuscated code. Scans WordPress databases for injected content.

CVE scanning (dpkg packages)

Reads installed packages from dpkg, matches against the National Vulnerability Database (NVD), scores with EPSS exploit probability, flags CISA KEV entries. Replaces manual apt-listbugs checks.

dpkg --get-selections

System integrity (dpkg -V)

Detects modified system binaries by comparing against dpkg package checksums. Finds rootkits that replace ls, ps, netstat, and other core utilities with trojanized versions.

dpkg -V

Credential and config exposure

Finds world-readable .env files, exposed .git directories, SSH keys with wrong permissions, and cloud credential files. Critical on Debian where AppArmor profiles may not be enforcing.

Debian Security Tracker vs Defensia CVE scanning

Debian maintains its own security tracker at security-tracker.debian.org, publishing DSA (Debian Security Advisory) and DLA (Debian LTS Advisory) notices. It's thorough but requires manual monitoring. Defensia automates the entire process.

CapabilityDebian Security TrackerDefensia
Data sourceDebian-specific DSA/DLANVD + EPSS + CISA KEV
Package matchingManual cross-referenceAutomatic via dpkg
Exploit probabilityNot providedEPSS score (0-1)
Active exploitation flagNot providedCISA KEV catalog
Delivery methodMailing list + web pageDashboard + alerts
Multi-server viewNot availableAll servers in one dashboard
Notification channelsEmail (debian-security-announce)Email, Slack, Discord, webhook

The Debian Security Tracker is an excellent reference, but it requires you to subscribe to debian-security-announce, cross-reference installed packages manually, and decide which CVEs actually affect your server. Defensia reads your installed packages via dpkg, matches them against the NVD, scores them with EPSS (exploit probability), and flags anything in the CISA Known Exploited Vulnerabilities catalog. No mailing lists, no manual checks.

Debian as a Docker host — securing the foundation

Debian is one of the most popular base images for Docker containers (debian:bookworm-slim). Many hosting providers — OVH, Hetzner, Contabo — default to Debian for dedicated servers and VPS instances. When Debian is your Docker host, every container inherits the host's security posture.

Defensia detects Docker installations on Debian, monitors container health, reads web server logs from containerized nginx and Apache instances, and blocks attackers at the host firewall level. Whether you run Docker Compose stacks or standalone containers, the agent sees all traffic flowing through the host network. See container security for Docker and Kubernetes-specific features.

Supported Debian versions

Debian 12 Bookworm

CURRENT STABLE

Released June 2023. Full security support until June 2026, LTS until June 2028. Ships with Linux 6.1 LTS kernel, nftables as default firewall backend.

Linux 6.1nftablesPython 3.11OpenSSH 9.2

Debian 11 Bullseye

LTS

Released August 2021. Standard support ended August 2024. LTS support until August 2026. Still widely deployed on dedicated servers and legacy infrastructure.

Linux 5.10iptablesPython 3.9OpenSSH 8.4

Debian derivatives (Devuan, Kali, Raspberry Pi OS, Proxmox VE) are also compatible. Requires: systemd + iptables + root access.

Frequently asked questions

How do I harden a Debian server?

Start with the basics: disable root SSH login, use key-based authentication, configure a firewall, and enable automatic security updates. Or install Defensia with one command and get SSH protection (15 patterns), WAF (15+ OWASP types), malware scanning (64K+ signatures), CVE detection, and a real-time dashboard — all without editing a single config file. Defensia handles the critical hardening steps that most Debian guides describe manually.

Does Defensia work on Debian 12 Bookworm?

Yes. Defensia works on both Debian 12 Bookworm and Debian 11 Bullseye. The agent auto-detects nftables (Bookworm default) and iptables (Bullseye default) and uses the appropriate backend. It also supports Debian derivatives like Devuan, Proxmox VE, and Raspberry Pi OS.

Do I need iptables or nftables with Defensia?

Defensia uses ipset with iptables for IP blocking. On Debian 12 Bookworm, iptables commands are translated to nftables via the iptables-nft compatibility layer, which is installed by default. You don't need to choose or configure either — the agent handles it automatically.

Does Defensia replace fail2ban on Debian?

Yes. Defensia detects all SSH attack patterns that fail2ban covers, plus adds WAF (15+ OWASP attack types), malware scanning (64K+ hash signatures), CVE scanning, geoblocking, bot management, and a real-time web dashboard. No jail configuration, no filter files, no regex to maintain.

How does Defensia check for Debian security updates?

Defensia reads installed packages from dpkg and matches them against the NVD (National Vulnerability Database). Each CVE is scored with EPSS (exploit probability) and flagged if it appears in the CISA Known Exploited Vulnerabilities catalog. This is more comprehensive than subscribing to debian-security-announce because it covers all packages, not just those with a DSA.

Is the Defensia agent free for Debian?

Yes. The free plan includes 1 server with full SSH protection, bot detection, and the real-time dashboard. The agent is MIT licensed and open source. Pro costs EUR 9/server/month (EUR 7 billed annually) and adds WAF, malware scanning, CVE scanning, geoblocking, alerts, and team management.

Sources

  • Debian Security FAQ — debian.org/security/faq
  • Debian Security Tracker — security-tracker.debian.org
  • Securing Debian Manual — debian.org/doc/manuals/securing-debian-manual
  • NVD (National Vulnerability Database) — nvd.nist.gov
  • EPSS (Exploit Prediction Scoring System) — first.org/epss
  • CISA Known Exploited Vulnerabilities Catalog — cisa.gov/known-exploited-vulnerabilities-catalog
  • Defensia telemetry data — aggregated across 9 production Debian and Ubuntu servers

Harden your Debian server now

One command. Under 30 seconds. Works on Bullseye and Bookworm.

$ curl -fsSL https://defensia.cloud/install.sh | sudo bash
Create Free Account

No credit card required. Free for one server.