How can I use InSpec over SSH to verify that my Linux installation is secure?

Learn how to perform security assessments with InSpec over SSH.

By Mischa Taylor
April 25, 2017
Screen from "How can I use InSpec over SSH to verify that my Linux installation is secure?" Screen from "How can I use InSpec over SSH to verify that my Linux installation is secure?" (source: O'Reilly)

Diagnosing weaknesses early is the best way to prevent security breaches before they happen. In this video, Mischa Taylor demonstrates how to perform security assessments with the open source tool, InSpec, over SSH. All that is needed to follow along is a basic familiarity of the command line and SSH, as well as access to a Linux machine. System administrators, testers, and developers will learn how to include base protection with their Linux installs using security configurations developed by server hardening experts.

Continue learning Chef with the full Chef for Linux and macOS course on Safari.

Learn faster. Dig deeper. See farther.

Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

Learn more


Mischa Taylor was a consulting engineer at Chef where he specialized as a continuous delivery coach and trainer. He is the co-author of the O’Reilly book, Learning Chef. Mischa is the creator and maintainer of the open source Boxcutter project and currently works in the autonomous systems space.

Post topics: Infrastructure
Share: