4.2. How to Secure a Daemon
This section will give you some general guidelines to help you write more secure programs. However, because your daemon's security is much too important to use this document as the sole source of your security information, we urge you to read the books listed in the bibliography at the end of this chapter. The information here is really just an overview of the points you need to consider. Furthermore, this section does not tell you how to secure the Linux kernel or your appliance in general.
We'll break the topic of daemon security into three sections:
Designing a secure daemon
Writing a secure daemon
Limiting damage in case of a breach
4.2.1. Designing a Secure Daemon
Securing your daemon starts when you begin thinking about ...