||Securing Infrastructure Services
Certain core infrastructure services in the IT environment deserve special attention from the security practitioner, and that’s what this chapter is about. We already covered operating system security in Chapters 21
, and network security in Chapters 13
. But within the network there are certain applications that run on top of those operating systems and provide network connectivity essentials, on which the entire IT infrastructure depends. If those services go down, or if they are corrupted or abused by malicious software and attackers, security can be compromised. Thus, in this chapter we will look at specific security configurations and controls that can be applied to the ...