A key aspect of both Linux workstation and Linux server security is to implement and use user access controls to constrain what users can do with the system. Earlier in this book, we discussed how to create and manage users, groups, and permissions to do this. However, there are additional measures that you can take to increase the security of your systems. In this part of the chapter, we’ll review the following:
• To root or not to root?
• Implementing a strong password policy
• Configuring user limits
• Disabling user login
• Auditing files
Let’s begin by discussing the proper care and feeding of the root user account.
As we discussed earlier in this book, every Linux system, whether a workstation ...