Chapter 5. Filesystems, Volumes, and Encryption
AS A LINUX EXPERT, you already know how to set up partitions, logical volumes, and redundant array of independent disks (RAID) systems. You know how to configure those systems on selected directories. You know how to format those filesystems. But there are choices that can enhance security or at least limit the risk to important data. These choices relate to how such volumes are organized, how they're mounted, and how they're formatted. Of course, encryption of such filesystems can also enhance security.
While file and folder permissions are basic to Linux, they are the starting point for security on Linux. You'll examine those permissions when they're local and when they're mounted from remote systems. ...
Get Security Strategies in Linux Platforms and Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.