Book description
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.
Key Features
- Leverage this guide to confidently deliver a system that reduces the risk of being hacked
- Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more
- Master the art of securing a Linux environment with this end-to-end practical guide
Book Description
This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.
By the end of this book, you will be confident in delivering a system that will be much harder to compromise.
What you will learn
- Use various techniques to prevent intruders from accessing sensitive data
- Prevent intruders from planting malware, and detect whether malware has been planted
- Prevent insiders from accessing data that they aren’t authorized to access
- Do quick checks to see whether a computer is running network services that it doesn’t need to run
- Learn security techniques that are common to all Linux distros, and some that are distro-specific
Who this book is for
If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.
Publisher resources
Table of contents
- Preface
- Running Linux in a Virtual Environment
-
Securing User Accounts
- The dangers of logging in as the root user
- The advantages of using sudo
- Setting up sudo privileges for full administrative users
- Setting up sudo for users with only certain delegated privileges
- Advanced tips and tricks for using sudo
- Locking down users' home directories the Red Hat or CentOS way
- Locking down users' home directories the Debian/Ubuntu way
- Enforcing strong password criteria
- Setting and enforcing password and account expiration
- Preventing brute-force password attacks
- Locking user accounts
- Setting up security banners
- Summary
- Securing Your Server with a Firewall
-
Encrypting and SSH Hardening
- GNU Privacy Guard
- Encrypting partitions with Linux Unified Key Setup – LUKS
- Encrypting directories with eCryptfs
- Using VeraCrypt for cross-platform sharing of encrypted containers
- Ensuring that SSH protocol 1 is disabled
- Creating and managing keys for password-less logins
- Disabling root user login
- Disabling username/password logins
- Setting up a chroot environment for SFTP users
- Summary
- Mastering Discretionary Access Control
-
Access Control Lists and Shared Directory Management
- Creating an access control list for either a user or a group
- Creating an inherited access control list for a directory
- Removing a specific permission by using an ACL mask
- Using the tar --acls option to prevent the loss of ACLs during a backup
- Creating a user group and adding members to it
- Creating a shared directory
- Setting the SGID bit and the sticky bit on the shared directory
- Using ACLs to access files in the shared directory
- Summary
-
Implementing Mandatory Access Control with SELinux and AppArmor
- How SELinux can benefit a systems administrator
- Setting security contexts for files and directories
- Troubleshooting with setroubleshoot
- Working with SELinux policies
- How AppArmor can benefit a systems administrator
- Looking at AppArmor profiles
- Working with AppArmor command-line utilities
- Troubleshooting AppArmor problems
- Summary
-
Scanning, Auditing, and Hardening
- Installing and updating ClamAV and maldet
- Scanning with ClamAV and maldet
- SELinux considerations
- Scanning for rootkits with Rootkit Hunter
- Controlling the auditd daemon
- Creating audit rules
- Using ausearch and aureport
- Applying OpenSCAP policies with oscap
- Using SCAP Workbench
- More about OpenSCAP profiles
- Applying an OpenSCAP profile during system installation
- Summary
- Vulnerability Scanning and Intrusion Detection
-
Security Tips and Tricks for the Busy Bee
- Auditing system services
- Password-protecting the GRUB 2 bootloader
- Securely configuring BIOS/UEFI
- Using a security checklist for system setup
- Summary
- Other Books You May Enjoy
Product information
- Title: Mastering Linux Security and Hardening
- Author(s):
- Release date: January 2018
- Publisher(s): Packt Publishing
- ISBN: 9781788620307
You might also like
book
Mastering Linux Security and Hardening - Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …
video
Linux Security and Hardening, The Practical Security Guide
Keep yourself and your company out of the news by protecting your Linux systems from hackers, …
book
Mastering Linux Administration
Develop advanced skills for working with Linux systems on-premises and in the cloud Key Features Become …
book
Mastering Linux Security and Hardening - Third Edition
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, …