Chapter 2. Installation 25
topics. Furthermore, if you should find that you need to instigate change around any of these
topics, that you will commit your rationale to documentation as described above.
2.2 Common security holes
Each chapter in this book describes the common security holes and/or mistakes we have
seen in the field. Some of these security holes are actually introduced on purpose as
something of a necessary evil, in order to facilitate the installation of the software. Security
holes of this nature are easily remedied by the performance of some simple post-installation
hardening tasks. We will call these out as appropriate. But more often than not, these security
holes are more representative of a misplacement of faith in a single ...