Today, prudent system administrators defend their machines with a multi-layered security approach, using firewalls, automated patch management systems, sudo, fine tuning system access, log analysis tools and, recently, SELinux. SELinux provides additional Mandatory Access Controls beyond those traditionally provided in the UNIX security model. Recent Red Hat Enterprise Linux and Fedora Linux releases have an SELinux policy implementation called the “targeted policy”. SELinux aims to restrict the privileges of programs in multiple packages to the minimum required for correct operation. This can thwart an attack that depends on having read, write or execute access to certain files or directories.
- Installing & Configuring AIDE on Centos
- Apache HTTPD with SSL (HTTPS, Secure Socket Layer)
- Denyhosts
- Fail2ban
- Restrict User Account To: cvs, scp, sftp, rsync Only With Centos
- Securing sshd
- SELinux Common Commands & Troubleshooting
- SELinux Module Building
- SSH Access Using Public / Private DSA Or RSA Keys
- Sudo – An Advanced Howto
Last Modified: 22 Apr, 2020 at 16:38:48