Linux Security Essentials
This document is a brief introduction to Security related topics, regarding Linux hardening processes, based on Red Hat Enterprise Linux 6. All of these concepts can be also applied to CentOS6. With regards to RHEL 5/CenOS 5, most of the topics discussed here should work fine as well, with some some minor differences in the names of packages or small syntax changes. The same applies for older versions of RHEL and CentOS. In the case of completely different distributions like Debian or Ubuntu, most of these subjects can apply as well, however this article is mostly directed at Red Hat Enterprise Linux 6 / CentOS 6 systems.
- This guide is not DEFINITIVE, and will not make your servers 100% proof against attacks. This document acts as a guide to cover the most important topics and considerations for improving your server’s security.
- Some topics described in this article, like Identity Management, might be slightly different due to different packaging naming conventions between RHEL 6/CentOS 6 and RHEL 5/CentOS 5.
- It is not really secure to run an almost EoL (end of life) OS version. Since we are discussing security related topics here, if you are running CentOS 5/RHEL 5 the first measure you should be researching is how to migrate your systems to the newly released RHEL 7/ CentOS 7.
Please use the navigation links to continue reading articles related to the topic of Linux server security.
© 2014 Rackspace US, Inc.
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License
See license specifics and DISCLAIMER