Chapter 5: Linux Security Standards with Real-Life Examples
In this chapter, we'll explore the reasons why Linux hosts, like any hosts, need some care after initial installation – and in fact, throughout their life – to further secure them. Along the way, we'll cover various topics to build toward a final "big picture" of securing your Linux hosts.
The following topics will be covered in the chapter:
- Why do I need to secure my Linux hosts?
- Cloud-specific security considerations
- Commonly encountered industry-specific security standards
- The Center for Internet Security critical controls
- The Center for Internet Security benchmarks
- SELinux and AppArmor
Technical requirements
In this chapter, we'll be covering a number of topics, but the technical ...
Get Linux for Networking Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.