4.2. How to Secure a Daemon

This section will give you some general guidelines to help you write more secure programs. However, because your daemon's security is much too important to use this document as the sole source of your security information, we urge you to read the books listed in the bibliography at the end of this chapter. The information here is really just an overview of the points you need to consider. Furthermore, this section does not tell you how to secure the Linux kernel or your appliance in general.

We'll break the topic of daemon security into three sections:

  • Designing a secure daemon

  • Writing a secure daemon

  • Limiting damage in case of a breach

4.2.1. Designing a Secure Daemon

Securing your daemon starts when you begin thinking about ...

Get Linux Appliance Design now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.