Now that you have learned how to automate processes (Chapter 14, “Crontab and At,”) and create BASH scripts (Chapter 15, “Scripting,” and Chapter 16, “Common Automation Tasks,”), it is time to learn how to create a security policy for these features. This chapter focuses on what you should consider when creating an automation security policy.
After reading this chapter and completing the exercises, you will be able to do the following:
Create a security policy for the use of crontab and at.
Create a security policy for BASH scripts.
Some of the security features for crontab and at were covered in Chapter 14. Recall that you can determine who has access to the crontab command ...