Book description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion on the risks, threats, and vulnerabilities associated with Linux as an operating system using examples from Red Hat Enterprise Linux and Ubuntu. Part 2 discusses how to take advantage of the layers of security available to Linux—user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk students through the fundamentals of security strategies related to the Linux system.Table of contents
- Copyright
- Preface
- Acknowledgments
- About the Author
-
ONE. Is Linux Really Secure?
-
1. Security Threats to Linux
- The Fundamentals of Linux Information Security
- Security As a Process in the Open Source World
- Laws and Regulatory Requirements in Information Security
- Measuring Information Security
- The Open Source Security Testing Methodology Manual
- Linux and the Seven Domains of a Typical IT Infrastructure
- Attacks on Open Source Software
- Security in an Open Source World
- Costs and Benefits of Linux Security Measures
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 1 ASSESSMENT
-
2. Basic Components of Linux Security
- Linux Security Starts with the Kernel
- Security in the Boot Process
- Linux Security Issues Beyond the Basic Operating System
- The User Authentication Databases
- File Ownership, Permissions, and Access Controls
- Firewalls and Mandatory Access Controls
- Networks and Encrypted Communication
- The Latest Linux Security Updates
- Continuity and Resiliency with Virtualization
- Variations Between Distributions
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 2 ASSESSMENT
-
1. Security Threats to Linux
-
TWO. Layered Security and Linux
-
3. Basic Security: Facilities Through the Boot Process
- Security in the Server Room and the Physical Server
- Open Source Trusted Platform Modules and Open Trusted Computing
- Security on Virtual Hosts and Guests
- Locking Down Boot Hardware
- Locking Down Boot Loaders
- Challenges with a Standard Supported Kernel
- The Costs and Benefits of Obscurity
- Basic Security and the Five Process Controls
- Best Practices: Basic Security
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 3 ASSESSMENT
-
4. User Privileges and Permissions
- The Shadow Password Suite
- A Variety of Choices with User Privileges
- Securing Groups of Users
- A Hierarchy of Administrative Privileges
- Regular and Special Permissions
- Tracking Access Through Logs
- Pluggable Authentication Modules
- Authorizing Access with the PolicyKit
- Network User Verification Tools
- Best Practices: User Privileges and Permissions
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 4 ASSESSMENT
-
5. Filesystems, Volumes, and Encryption
- Filesystem Organization
- Journals, Formats, and File Sizes
- Using Encryption
- Local File and Folder Permissions
- Networked File and Folder Permissions
- Filesystems and Quotas
- Filesystems and Access Control Lists
- Best Practices: Filesystems, Volumes, and Encryption
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 5 ASSESSMENT
-
6. Every Service Is a Potential Risk
- Basic Bastion Hardening
- Bastions in a Virtualized Environment
- The Risks of Source Code and Development Tools
- Uninstalling Default Services
- Managing Super Servers and Deactivating Service Scripts
- Isolate with chroot Jails
- Avoid X Servers and X Clients Where Possible
- The Risks of Productivity Tools
- Best Practices: Service Deployment
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 6 ASSESSMENT
-
7. Networks, Firewalls, and More
- Services on Every TCP/IP Port
- Obscurity and the Open Port Problem
- Protect with TCP Wrappers
-
Packet Filtering Firewalls
- Basic Firewall Commands
- A Firewall for the Demilitarized Zone (DMZ)
- A Firewall for the Internal Network
- Alternate Attack Vectors—Modems and More
- Wireless-Network Issues
-
Security-Enhanced Linux (SELinux)
- The Power of SELinux
- Basic SELinux Configuration
- Configuration from the Command Line
- The SELinux Administration Tool
- The SELinux Troubleshooter
-
SELinux Boolean Settings
- Admin
- Compatibility
- Cron
- CVS
- Databases
- FTP
- Games
- HTTPD Service
- Kerberos
- Memory Protection
- Mount
- Name Service
- NFS
- NIS
- Polyinstatiation
- pppd
- Printing
- rsync
- Samba
- SASL Authentication Server
- SELinux Service Protection
- SpamAssassin
- Squid
- SSH
- Universal SSL Tunnel
- User Privs
- Web Applications
- X Server
- Zebra
- Setting Up AppArmor Profiles
- Best Practices: Networks, Firewalls, and TCP/IP Communications
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 7 ASSESSMENT
-
8. Networked Filesystems and Remote Access
- One System, One Shared Network Service
- Secure NFS as if It Were Local
- Keeping vsFTP Very Secure
- Linux as a More Secure Windows Server
- Make Sure SSH Stays Secure
- Networks and Encryption
- When You "Must" Use Telnet
- Remember the Modem
- Moving Away from Clear-Text Access
- Best Practices: Networked Filesystems and Remote Access
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 8 ASSESSMENT
-
9. Networked Application Security
- Web Services: Apache and Friends
- Working with Squid
- DNS: BIND and More
- Mail Transfer Agents: sendmail, Sendmail, Postfix, and More
- If You Asterisk
- Limit Those Printers
- Protect Your Time Services
- Options for Obscurity: Different Ports, Alternative Services
- Best Practices: Networked Application Security
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 9 ASSESSMENT
-
10. Kernel Security Risk Mitigation
- Functional Kernels for Your Distribution
- The Stock Kernel
- Stock Kernel Patches and Upgrades
- Security and Kernel Update Issues
- Kernel Development Software
-
Kernel Development Tools
- Before Customizing a Kernel
- Start the Kernel Customization Process
-
Kernel Configuration Options
- General Setup
- Enable Loadable Module Support
- Enable the Block Layer
- Processor Type and Features
- Power Management and ACPI Options
- Bus Options
- Executable File Formats/Emulations
- Networking Support
- Device Drivers
- Firmware Drivers
- Filesystems
- Kernel Hacking
- Security Options
- Cryptographic API
- Virtualization
- Library Routines
- Build Your Own Secure Kernel
- Kernels and the /proc/ Filesystem
- Best Practices: Kernel Security Risk Mitigation
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 10 ASSESSMENT
-
3. Basic Security: Facilities Through the Boot Process
-
THREE. Building a Layered Linux Security Strategy
-
11. Managing Security Alerts and Updates
- Keep Up to Speed with Distribution Security
- Keep Up to Speed with Application Security
- Linux Has Antivirus Systems Too
- Get Into the Details with Bug Reports
- Security in an Open Source World
- Automated Updates or Analyzed Alerts
- Linux Patch Management
- Options for Update Managers
- Commercial Update Managers
- Open Source Update Managers
- Best Practices: Security Operations Management
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 11 ASSESSMENT
-
12. Building and Maintaining a Security Baseline
- Configure a Simple Baseline
- Read-Only or a Live Bootable Operating System
- Update the Baseline
- Monitor Local Logs
- Consolidate and Secure Remote Logs
- Identify a Baseline System State
- Check for Changes with Integrity Scanners
- Best Practices: Build and Maintain a Secure Baseline
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 12 ASSESSMENT
-
13. Testing and Reporting
- Test Every Component of a Layered Defense
- Check for Open Network Ports
- Run Integrity Checks of Installed Files and Executables
- Make Sure Security Does Not Prevent Legitimate Access
- Monitor That Virtualized Hardware
- Standard Open Source Security Testing Tools
- Commercial Security Test Tools for Linux
- The Right Place to Install Security Testing Tools
- Best Practices: Testing and Reporting
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 13 ASSESSMENT
-
14. Detecting and Responding to Security Breaches
- Regular Performance Audits
- Make Sure Users Stay Within Secure Limits
- Log Access into the Network
- Monitor Account Behavior for Security Issues
- Create an Incident Response Plan
- Have Live Linux CDs Ready for Forensics Purposes
- When You Put Your Plan into Action
- Backup and Recovery Tools
- The Right Way to Save Compromised Data as Evidence
- Disaster Recovery from a Security Breach
- Open Source Security Works Only If Everyone Shares
- Best Practices: Security Breach Detection and Response
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 14 ASSESSMENT
-
15. Best Practices and Emerging Technologies
- Maintain a Gold Baseline
- Redundancy Can Help Ensure Availability
- Trust But Verify Corporate Support
- Check Conformance with Security Policies
- Keep the Linux Operating System Up to Date
- Keep Distribution-Related Applications Up to Date
- Manage Third-Party Applications Carefully
- When Possible, Share Problems and Solutions with the Community
- Test New Components Before Putting Them into Production
- Future Trends in Linux Security
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 15 ASSESSMENT
-
11. Managing Security Alerts and Updates
- A. Answer Key
- B. Standard Acronyms
- Glossary of Key Terms
- References
Product information
- Title: Security Strategies in Linux Platforms and Applications
- Author(s):
- Release date: October 2010
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9780763791902
You might also like
book
Security Strategies in Linux Platforms and Applications, 2nd Edition
The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of …
book
Linux Server Security, Second Edition
Linux consistently appears high up in the list of popular Internet servers, whether it's for the …
book
Linux Server Security
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: …
book
Linux Server Hacks
A competent system administrator knows that a Linux server is a high performance system for routing …