Chapter 17Develop an Automation Security Policy
Now that you have learned how to automate processes (Chapter 14, “crontab and at”) and create BASH scripts (Chapter 15, “Scripting,” and Chapter 16, “Common Automation Tasks”), it is time to learn how to create a security policy for these features. This chapter focuses on what you should consider when creating an automation security policy.
After reading this chapter and completing the exercises, you will be able to do the following:
Create a security policy for the use of crontab and at
Create a security policy for BASH scripts
Securing crontab and at
Some of the security features for crontab and at were covered in Chapter 14. Recall that you can determine who has access to the crontab command ...
Get Linux Essentials for Cybersecurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.