Introduction


It has been a real privilege to be part of the talented team of people who work with securing Linux on a daily basis and have labored long hours to compile this guide in a timely manner. It has not been easy, but they have done a great job at putting together a thorough and accurate step-by-step approach to securing Linux.

In our effort to include the best practices across the board, many technical reviews were done to ensure that, when put into practice, the ideas and examples in the Guide do work according to the text. As with any *inx variant OS, there are several ways to accomplish the same task. While most of them work and provide a similar outcome, we had to draw the line on what to include for the sake of making this a useful guide. If you have more efficient ways of dealing with issues discussed, please feel free to send them to me at linux-sbs@sans.org for possible inclusion in versions published at a later date. We concentrated on Red Hat 7.3 because it was the most widely used version while this Guide was being compiled and will be for some time until Red Hat 8.0 is better established. Remember that this is a guide, and should be used as such. Not everything included is for every system.

Education on the OS, applications and system usage are essential for a base in the security field. I strongly believe you should know how something affects the system, and not just how to "cut and paste" fixes. We have tried to explain the "why" behind all the recommendations in this Guide, and hope that every reader gains a little more knowledge about securing a Linux system.

Mitch Baker

Senior Systems/Security Administrator
Rose-Hulman Institute of Technology




Securing Linux. A Survival Guide for Linux Security
Securing Linux: A Survival Guide for Linux Security (Version 2.0)
ISBN: 0974372773
EAN: 2147483647
Year: 2002
Pages: 39

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net