O'Reilly logo

Linux Essentials for Cybersecurity, First Edition by William Rothwell, Denise Kinsey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17 Develop an Automation Security Policy

Now that you have learned how to automate processes (Chapter 14, “Crontab and At,”) and create BASH scripts (Chapter 15, “Scripting,” and Chapter 16, “Common Automation Tasks,”), it is time to learn how to create a security policy for these features. This chapter focuses on what you should consider when creating an automation security policy.

After reading this chapter and completing the exercises, you will be able to do the following:

Create a security policy for the use of crontab and at.

Create a security policy for BASH scripts.

Securing crontab and at

Some of the security features for crontab and at were covered in Chapter 14. Recall that you can determine who has access to the crontab command ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required