Chapter 6: Managing Linux Security and Identities
In the previous chapter, we discussed handling storage, along with network and process management. However, as a system administrator, your primary goal is to secure your Linux machine to deny any unauthorized access or limit access to users. In an enterprise environment, security breaches are a massive concern. In this chapter, we'll be covering security—the protection of your workload at the operating system level; for example, if your organization is a financial institution where you will be dealing with workloads that deal with monetary commitments and even the personally identifiable information (PII) of customers, it's critical that you secure the workload to avoid any breaches. Of course, ...
Get Hands-On Linux Administration on Azure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.