Deploy and secure your server in one command
From zero to hardened production in under 3 minutes. CIS benchmarks, automatic updates, compliance evidence — all included.
What You Get
What Postava applies in one command
Real hardening operations, not marketing checkmarks.
$ postava push --target production
→ Connecting to 192.168.1.100...
→ SSH hardening applied
→ Firewall rules enforced
→ Kernel network protections enabled
→ Fail2ban configured
→ TLS reverse proxy configured
→ Container deployed
→ Hardening report generated
✓ Server hardened and deployed in 2m 47s
Hardening Report
PASSED92/100
Security Score
Applied Controls
All Operations
SSH Key Setup
Replace password auth with key-based access
Firewall Config
UFW rules for essential ports only
Package Updates
All packages updated to latest versions
CIS Benchmarks
Level 1 or Level 2 hardening applied
Fail2ban
Brute force protection configured
Automatic Updates
Unattended security updates enabled
Audit Logging
auditd configured for compliance
User Management
Sudo access and user isolation
Service Hardening
Unnecessary services disabled
SSL/TLS Config
Modern cipher suites enforced
Evidence Export
Compliance evidence generated
Pricing
Free vs Pro
Start free. Upgrade when you need fleet management and compliance features.
| Feature | Free | Pro |
|---|---|---|
| Single server deployment | ||
| CIS Level 1 hardening | ||
| Automatic updates | ||
| Fleet management | ||
| CIS Level 2 hardening | ||
| Compliance evidence export | ||
| Drift detection | ||
| Scheduled hardening | ||
| Support | Community | Priority |
Value
Why teams use Postava
Save Hours Per Server
Replace 2-4 hours of manual hardening with a 3-minute command. Scale without adding headcount.
Consistent Security
Every server gets the same hardening. No drift, no forgotten configurations, no human error.
Audit-Ready Evidence
Generate compliance evidence on demand. CIS benchmarks map directly to SOC 2 and ISO 27001.
Roadmap
What is coming
Postava is actively developed. Here is what we are building next.
Multi-server fleet management
Drift detection and remediation
Custom hardening profiles
Windows server support
Kubernetes node hardening
Security Graph
How Postava feeds the platform
Postava writes remediation records to the shared security graph. Other modules consume them.
Postava writes
Remediation records with evidence
Hardening configs, scores, audit trails
Other modules use it for
Odbrana
Asset inventory
Napad
Re-validate after fix
Regulativa
Control evidence
Risk Engine
Tracks remediation
Get Started
Install Postava
One command to install. One command to deploy.