December 2017
Intermediate to advanced
410 pages
11h 5m
English
This section deals with security mechanisms that need to be implemented in the servers, which will be deployed in your environment:
|
Sr. no. |
Point |
Description |
|
1 |
SSH password authentication is a no no, only key-based authentication |
Never use SSH password-based authentication, use key-based authentication always. |
|
2 |
Auditing is a must |
One should have keen awareness of what is happening in the server and who is making the changes. AuditD is a great daemon, which can give us granular visibility. Make sure to implement and configure AuditD in your server environment. |
|
3 |
File integrity monitoring is an integral part of the server |
FIM is a very important part of server security. There should be base ... |
Read now
Unlock full access