How To Harden Cisco Linux On A Cisco Box On A Linux System On A Ubuntu System On An Ubuntu (Amd64) System On Cisco V2.2.3 (Ahemos) On A Windows 7 (
|
|
|
- Chrystal Montgomery
- 5 years ago
- Views:
Transcription
1 Linux Hardening Recommendations For Cisco Products Copyright Cisco Public
2 Version 1.0 Contents 1 Introduction Motivation Applicability Audience Organization Scope Linux Hardening Recommendations Remove or Disable Unnecessary Services, Ports, and Devices. Otherwise, Configure to be Secure Services and Utilities Open Ports Devices/Interfaces Separate System Critical Files and Directories from Dynamic Content Control Access to, and Enforce Permissions on Important Resources World-Writable Files and Directories Root File Ownership UIDs and GIDs Umask Shell Access File Transfer Account Management Partition Mount Options Filesystems Ensure the Integrity of Critical Files and Environment Parameters Environment Variables Enabled Logging With Log Rotation Restrict direct access to memory through device files Configure Secure Development and Runtime Defense Features ASLR X-Space Protection Object Size Checking Stack/Heap Smashing Protection Compilers Debuggers Utilize Additional Security Features and Tools When Necessary References Appendix A. Secure Configuration for Well Known Services and Utilities OpenSSH DHCP Server Copyright Cisco Public
3 DHCP Client SNMP Server B. Permission and File Ownership Recommendations C. Disable Root Shell Linux Services Console Devices OpenSSH FTP Server D. Secure Run-time Kernel Configuration E. Grsecurity Configuration List of Tables Table 1: Permission and Ownership Recommendations Copyright Cisco Public
4 1 Introduction 1.1 Motivation Cisco has released a significant number of products that are built on the Linux operating system (OS). In the past, security-related Linux configuration issues have been observed in Cisco products. This document aims to identify security criteria specifically applicable to Linux that should be met in order to ensure a certain baseline level of security for Cisco's Linux-based products. As Cisco releases an increasing number of products on the Linux OS, it is important that their underlying OS is configured securely. 1.2 Applicability The purpose of this document is to provide a concise and manageable set of security configuration recommendations for Linux when embedded within Cisco products. Cisco Secure Development Lifecycle (CSDL) references many hardening guides for various operating systems. Several of these are for Linux, however their focus is on the secure configuration of general purpose computers running Linux, not on how Linux in an embedded system should be configured by the system developers. This document is intended to assist Cisco engineers who are developing Linux-based systems. This document is the product of a survey performed across many well-known general purpose Linux Hardening guides and security tools. For the survey, each of the recommendations in the general-purpose guidelines were prioritized and ranked according to their level of applicability within the environment of Cisco's products built on Linux. Only recommendations with general applicability across all Linux distributions were considered for inclusion. This document is not intended to provide an exhaustive list of hardening recommendations to cover all installation variants (desktop, server, etc.), nor is it intended to cover the security configuration corner cases for all the different Linux distributions in use within Cisco. 1.3 Audience This document is written for technical personnel and developers with some knowledge about Linux configuration, for the purpose of improving the security posture of Linux-based Cisco products. This document can also be useful for personnel that produce technical requirements. 1.4 Organization Each major section title describes the high-level objective, followed by subsections that outline specific methods to achieve the objective. Significantly lengthy implementation instructions (e.g., configuration files) and conditional recommendations are in the Appendix. Copyright Cisco Public
5 1.5 Scope The recommendations in this document pertain to Cisco products that utilize Linux. Although many of these recommendations can be applied to similar Unix-based platforms, non-linux operating systems are beyond the scope of this document. Copyright Cisco Public
6 2 Linux Hardening Recommendations 2.1 Remove or Disable Unnecessary Services, Ports, and Devices. Otherwise, Configure to be Secure Services and Utilities [2, 3, 7, 9, Services and utilities that do not have a defined purpose on a system should be removed 10]. If removal is not possible, but the service or utility can be disabled, then it should be disabled. If a service or utility is necessary, available secure configuration best practices should be implemented. Security configurations for some well-known services and utilities are in Appendix A. The following legacy services are inherently insecure and should be avoided [7, 19, 1, 6] : rlogind, rshd, rcmd, rexecd, rbootd, rquotad, rstatd, rusersd, rwalld, rhosts, rexd These services offer insufficient authentication, no encryption, and are not considered secure. They should be removed along with their configuration files. Telnet, FTP, and NFS have security weaknesses that are well known, however customers may have requirements to use these services. If remote shell access and file transfer are required, then provide more secure options, such as SSH and SFTP/SCP Open Ports Open network ports provide an attack surface for potential remote exploits. If an open port does not belong to a service/protocol with a defined purpose on the system, then it should be closed. Services should only be run on their well-known ports (as identified in the IANA Service Name and Transport Protocol Port Number Registry). Unregistered services/protocols should never be run on ports that are already registered [5]. Remove support for unused protocols by disabling them in the compile-time kernel configuration. For example, if SCTP is not needed, then compile the kernel with CONFIG_IP_SCTP=n. To find open ports, use the netstat and lsof utilities as follows: netstat lntup lsof -i To close the port, kill the service process that is listening on the port, and then remove the package associated with the service Devices/Interfaces Devices and interfaces that are not needed should be disabled/removed. This includes: Copyright Cisco Public
7 Network interfaces (including wireless interfaces) Storage devices (including USB) Console devices Bluetooth interfaces If the device or interface is not needed, remove the driver. Do not automount devices (such as USB). 2.2 Separate System Critical Files and Directories from Dynamic Content Dynamic content, like logs or temporary files, should be separated from system critical items, like the OS and installed applications [2, 4, 6]. This mitigates scenarios that may result in systems crashes due to dynamic content (e.g. tmp directories) filling up the storage space and making the system unstable or unusable. Because of this, dynamic content and system critical resources should be mounted on separate partitions: Mount /tmp and /var/run on their own filesystems. Bind-mount /var/tmp to /tmp Although quotas are not supported by some filesystems, they can be utilized to limit the amount of storage space that dynamic content can utilize on products with applications that are not run with root privileges [7]. To enable quotas: Add the "usrquota" or "grpquota" qualifier to the partition in /etc/fstab. Use the quotaon command to enable disk quotas on the system Use the edquota commands below to launch a text editor, in which quota values can be set for accounts and groups respectively: edquota -u username edquota -g group Quota information storage varies by filesystem type. However, it is usually stored in aquota.user and aquota.group or quota.user and quota.group files in the root of the filesystem. 2.3 Control Access to, and Enforce Permissions on Important Resources World-Writable Files and Directories Configuring files and directories to be writable (world-writable) by all users on the system is not recommended. World-writable items can be written to and modified by every account on the system. Because of this, files and directories with any significance should not be world-writable. Copyright Cisco Public
8 If the system must have a world-writable directory (e.g. /tmp), it is advisable to set the sticky bit on the directory to ensure that files in that directory may be deleted or modified only by root or their owner [1, 6, 7, 9, 11, 18]. To find all world-writable files on a filesystem, run: % find / -type f -perm print To set the sticky bit on the /tmp directory, run: % chmod +t /tmp File permission and ownership recommendations for common files and directories in Linux are in Appendix B Root File Ownership Files that should only be readable, writable, or executable by root, should be owned and groupowned by root. If these files are owned by an account other then root, then the account controls permissions on the file. File ownership recommendations for common files and directories in Linux are in Appendix B UIDs and GIDs User identifier (UID) values reference kernel-level user accounts on the system and group identifier (GID) values reference groups. Identifier assignment can result in elevated privileges if an account is assigned a UID/GID with elevated privileges. UID 0 is a privileged UID and should be reserved only for the root account [1]. To find all SUID programs, run: # find / -type f -perm ls If periodic privileged access is required through su or sudo, logging should be enabled. Sudo allows programs to be run with root privileges and can lead to easy escalations to root. When the set user ID (SUID) or set group ID (GUID) attributes are set on executables in the filesystem, those executables will be run as the user or group owning the file (typically the root user). This is commonly used to enable non-root users to perform small tasks that require root privileges, like changing their system password with the SUID-root passwd program. % ls l /usr/bin/passwd -rwsr-xr-x 1 root root :28 /usr/bin/passwd The s bit above signifies that the SUID attribute is set for passwd Since programs should not run with unnecessarily elevated privileges, remove the SUID/SGID bits from any programs that do not need the elevated privileges [7, 8]. Copyright Cisco Public
9 Consider utilizing Access Control Lists (ACLs) and extended filesystem attributes (xattr) as alternatives to SUID/SGID root programs [17]. ACLs allow more flexibility and fine-grained control over the permissions of files and directories than standard permissions. For example, this would allow a program to update a root-owned file while executing without root permissions. Extended file attributes allow additional configurable permissions that include preventing file deletion or modification, and permitting or denying symbolic links on a file Umask Umask is a function that sets a file mode creation mask for processes. When a shell or other program creates a file or directory, it can specify permissions to be granted to the created entity. However, permissions that the file mode creation mask does not allow, are not set. Because of this, the following umask recommendations should be set for each daemon/user account on the system: Umask values should allow read, write, and execute permissions for owner Umask values should not allow write permissions for group and other If read and/or execute privileges are not needed for group and/or other, then umask values should not allow this The effective umask can be set in the shell interpreter that is used to launch applications. The following example sets the umask to 022, which sets default directory permissions to chmod 755 and default file permissions to chmod 664): % umask Permissions The Principle of Least Privilege requires that in a particular abstraction layer of a computing environment, modules should be able to only access resources that are necessary for their legitimate purpose. This principle should be applied within the context of filesystem ownership and permissions. Files and directories should only grant the minimum permissions for a program or a user to accomplish their intended duty. Directories that contain files or sub-directories that are not writable should also not be writable. If the containing directory is writable, another account could copy the file, modify the file, then replace the original file with the copied file Shell Access In a Linux environment, privilege escalation can be achieved by accessing a root shell through a service that has root privileges. Any user/process that gains access to a root shell will possess root privileges on the system. Where it is possible, programs that run with elevated privileges should be configured to prevent unnecessary file reads/writes, shell escapes, and execution of other programs. Login shell access should be disabled for non-root system/daemon accounts on the system [4]. Copyright Cisco Public
10 If remote shell access is necessary, using ssh instead of telnet is strongly encouraged. Unlike ssh, the telnet protocol does not encrypt the information that it transfers, this includes authentication credentials. This is insecure and should be avoided. If telnet is not needed on the system, then it should be removed. Configuration recommendations to restrict shell access are in Appendix C File Transfer For non-anonymous file transfer, using scp or sftp instead of ftp is strongly encouraged because ftp allows insecure authentication and does not encrypt transmitted data Account Management Linux user/daemon accounts that are not necessary should be deleted. If single-user mode is not necessary, then it should also be disabled [7, 10] Partition Mount Options There are several security restrictions that can be set on a filesystem when it is mounted. Some common security options include, but are not limited to: nosuid - Do not allow set-user-identifier or set-group-identifier bits to take effect nodev - Do not interpret character or block special devices on the filesystem noexec - Do not allow execution of any binaries on the mounted filesystem ro - Mount filesystem as read-only Filesystems options can be set by adding/editing lines formatted like the following line in the /etc/fstab file: <file system> <mount point> <type> <options> <dump> <pass> Example: /dev/sda2 /boot ext3 nosuid,nodev 0 0 Changes to fstab are applied at boot-time. To mount all of the filesystems in fstab at run-time, run: sudo mount -a The following are recommendations for mounting common filesystems: [7, 17] For /boot partition, use nosuid and nodev and consider using noexec For /var and /tmp in your /etc/fstab or vfstab file, add nosuid, nodev and noexec [7, 10] Copyright Cisco Public
11 For non-root local partitions (If the filesystem type is ext2 or ext3 and The mount point is not '/'), add nodev option [1] For to removable storage partitions, add nodev, nosuid, and noexec options [1] For temporary storage partitions add nodev, nosuid, and noexec options [1] For /dev/shm, add nodev, nosuid, and noexec options [1] Filesystems Filesystems should support POSIX permissions at a minimum. 2.4 Ensure the Integrity of Critical Files and Environment Parameters Remove configuration files associated with services and applications that are not on the system. Root s login files should not source any file owned by another user or that are group/world writable [7] Environment Variables Environmental variables, including the PATH variable, should only contain absolute paths. They should not contain relative directories (eg.../.. or. or..), the root directory(/), or empty strings [7]. Environmental variables should only reference existing directories and should not reference world/group writable directories [6, 7, 9, 14, 18]. This will prevent other accounts from writing to directories in the $PATH. 2.5 Enabled Logging With Log Rotation In order to keep an accurate audit of activity on the system, logging of all major system events should be enabled. In Linux, logging is typically managed by the syslogd daemon. Systems should run with logging enabled at all times. Logging services (eg. syslogd) should be enabled in the system's startup scripts. These can vary based on the Linux distribution, but they are typically located in the /etc/rc.d/ or /etc/init.d/ directory. Log data can grow to fill disks quickly. Because of this, log rotation should be enabled [1]. Separate programs from the actual logging services (eg. savelog, logrotate) typically handle file rotation. Log rotation program(s) must run in conjunction with logging services. Similar logging programs (eg. rsyslog) attempt to listen to the same sockets (as syslog) and compete for resources. Using multiple loggers to monitor the same resources is not recommended. Copyright Cisco Public
12 2.6 Restrict direct access to memory through device files The /dev/mem and /dev/kmem files in Linux systems are directly mapped to physical and kernel memory respectively. This can be disastrous if an attacker gains root access, as they would have direct access to physical and kernel memory. Write access to memory through the /dev/mem device file should be disabled [5, 18]. To do so, the following kernel option should be set in the compile-time kernel configuration: CONFIG_STRICT_DEVMEM=y To disable the /dev/kmem file, the following kernel option should also be set in the compiletime kernel configuration: CONFIG_DEVKMEM=n 2.7 Configure Secure Development and Runtime Defense Features ASLR Address Space Layout Randomization (ASLR) randomizes where specific memory components (eg. stack, heap, libraries) are mapped in the address space of a process. This makes the exploitation of traditional memory corruption vulnerabilities probabilistically difficult. ASLR should be enabled for systems that support it [14] X-Space Protection Executable Space protection (X-Space) is a security feature found in microprocessors that augments the memory area attributes to indicate whether software can be executed from that memory location. It is also known at nx, Xbit, xd, and MMU from different microprocessor vendors. When applied to processes, this can prevent memory areas on the stack and from being executable. X-Space protection is dependent on: Whether the CPU supports No execute technology. Whether the kernel utilizes X-Space protection. Whether the build tool-chain produces executables that have proper ELF headers. If the system supports X-Space protection, then it should be enabled Object Size Checking C and C++ should be compiled with Built-in Object Size Checking (BOSC) to provide limited buffer overflow protection mechanisms that are designed to detect buffer overflows at compile time. If the compiler is unsure about the safety of a particular call, it will remap the call to a wrapper that offers some run time buffer overflow protection. Copyright Cisco Public
13 If the GCC compiler supports BOSC, then it can be enabled at compile time by passing GCC the -D_FORTIFY_SOURCE=2 option. Note that GLIBC must also be (re)compiled with this flag in order to fully enable runtime protections. Example: % gcc -D_FORTIFY_SOURCE=2 abcd.c Stack/Heap Smashing Protection Applications should be compiled with available stack protection features enabled. GCC has fstack-protector and fstack-protector-all flags that enable ProPolice s stack protection mechanisms [5, 15]. The GNU C Library heap protector provides corrupted-list/unlink/double-free/overflow protections to the glibc heap memory manager [5]. This prevents heap memory overflows that attempt to corrupt the control structures of the malloc heap memory areas Compilers Compilers are utilized in development environments. Since software components in Cisco s Linux-based products are typically compiled and built prior to the product being shipped, the products should not be shipped with compilers. If a product is compromised, compilers provide an attacker with the ability to compile code Debuggers If the customer model does not require debugging capabilities, then the product should not be shipped with debuggers. Additional recommended kernel hardening recommendations are in Appendix D. 2.8 Utilize Additional Security Features and Tools When Necessary It may be beneficial to utilize existing tools to achieve additional security. The following tools may not be necessary in all scenarios, however they offer useful security features. These tools include: Linux Pluggable Authentication Modules (PAM) - PAM provides dynamic authorization for users, applications, and services on a Linux system. Account verification criteria can include expiration date and duration, time of day, and access to a requested service. Copyright Cisco Public
14 Linux Security Modules (LSM) - LSM is a framework that allows the Linux kernel to support a variety of access control related computer security models. Some modules that utilize the LSM framework are described below: o Security-Enhanced Linux (SELinux) - SELinux is a Linux feature that provides a mechanism for supporting access control security policies, including mandatory access controls, through the use of Linux Security Modules (LSM) in the Linux kernel. o Application Armor (AppArmor) - AppArmor is a security module for the Linux kernel, released under the GNU General Public License. AppArmor allows the system administrator to associate with each program a security profile that restricts the capabilities of that program. Grsecurity Grsecurity is a set of security related patches for the Linux kernel. This allows the kernel to support role-based access control, program memory protection, and chroot restrictions. Grsecurity includes PaX, a patch that implements ASLR and X-Space protections above and beyond those included in the mainline kernel. Recommended grsecurity configurations are in Appendix E. Tripwire - Tripwire functions as a file-modification detection system. Rather than attempting to detect intrusions at the network interface level (as in network intrusion detection systems), Open Source Tripwire detects changes to files, which may reveal if the system has been compromised in some fashion. Samhain Samhain another host-based intrusion detection system. However, unlike Tripwire, it utilizes cryptographic checksums of files to monitor file integrity. Samhain can also: o Find rogue SUID executables anywhere on disk. o Monitor which ports are open on the local host and compare against a list of allowed or required port/services. o Check for hidden processes (i.e. not listed in the output from ps ) ExecShield - ExecShield is a security Linux kernel patch to primarily found in Red Hat s Linux distribution, to implement some ASLR and X-Space protections. If the system supports ExecShield, then it should be enabled. Add the following line in the run-time kernel configuration to enable ExecShield: kernel.exec-shield=1 Copyright Cisco Public
15 Third party software vulnerabilities can provide an attack surface for potential exploits. Because if this, it is important to make sure that security patches and upgrades for third party software have been applied. 3 References [1] NSA, Guide to the Secure Configuration of Red Hat Enterprise Linux 5 [2] Werner Puschitz, Securing and Hardening Red Hat Linux Production Systems [3] SANS Institute, Linux Security Checklist [4] Red Hat, Hardening Red Hat Enterprise Linux 5 [5] Ubuntu, Ubuntu Security Feature Matrix & Tools [6] CIS, Security Configuration Benchmark For Red Hat Enterprise Linux 5 [7] AusCERT, UNIX and Linux Security Checklist v3.0 [8] CERT, UNIX Configuration Guidelines [9] Kevin Fenzi, Linux Security HOWTO [10] Bob Cromwell, How To Harden a Linux or OpenBSD Installation [11] David A. Ranch, A Guide to Configuring Your Linux Server [12] Linux Security Auditing Tool (LSAT) [13] Tiger, Security Audit and Intrusion Detection System Copyright Cisco Public
16 [14] checksec.sh [15] CIS Security/Benchmark Assessment Tools [16] Lynis [17] Rootkit hunter [18] UNIX/Linux Local Audit Tool Copyright Cisco Public
17 Appendix A. Secure Configuration for Well Known Services and Utilities This section outlines hardening recommendations for well-known Linux services and utilities. OpenSSH In the /etc/ssh/sshd_config file [1, 2, 3, 4, 6, 7, 10, 19] : # SSH-1 is obsolete and should be avoided at all cost. # Only Use SSH Protocol 2. Protocol 2 # Configure Idle Log Out Timeout Interval ClientAliveInterval 300 ClientAliveCountMax 1 # Don't read ~/.rhosts and ~/.shosts files IgnoreRhosts yes # Disable Host-Based Authentication HostbasedAuthentication no # Disable root Login via SSH PermitRootLogin no #prevent users from being able to present #environment options to the SSH daemon PermitUserEnvironment no #Disable Empty Passwords PermitEmptyPasswords no # Turn on privilege separation UsePrivilegeSeparation yes # Disable TCP Forwarding AllowTcpForwarding no # Disable X11 Forwarding X11Forwarding no # Disable port forwarding (tunneling) PermitTunnel no DHCP Server This section consists of best practices for DHCP server. In the /etc/dhcpd.conf file, Add or correct the following parameters [1] : Copyright Cisco Public
18 # To prevent the DHCP server from receiving DNS information from clients ddns-update-style none; # Preventing the DHCP server from responding to DHCPDECLINE messages. deny declines; # Unless your network needs to support older BOOTP clients, # disable support for the bootp protocol deny bootp; For each address range within /etc/dhcpd.conf, ensure that the following options are not defined unless there is an operational need to provide this information: option nis-servers option ntp-servers option time-offset DHCP Client This section outlines best practices for DHCP client configuration. The following DHCP client parameters are set in the /etc/dhclient.conf file. If this file does not exist, then create it. For settings that should not be configured remotely by the DHCP server, select an appropriate static value, and add the following line [1] : supersede setting value; If the DHCP server should configure the setting remotely, add the following lines [1] : request setting; require setting; The following is an example of a DHCP configuration for a server that should only provide an IP address and the subnet mask [1] : supersede domain-name "example.com"; supersede domain-name-servers ; supersede nis-domain ""; supersede nis-servers ""; supersede ntp-servers "ntp.example.com"; supersede routers ; supersede time-offset ; request subnet-mask; require subnet-mask; SNMP Server Listed below are best practices for SNMP server configuration [1] : Use only SNMP version 3 security models and enable the use of authentication and encryption Copyright Cisco Public
19 Write access to the MIB (Management Information Base) should be allowed only if necessary All access to the MIB should be restricted following a principle of least privilege Ensure SNMP agents send traps only to, and accept SNMP queries only from, authorized management stations Ensure that permissions on the snmpd.conf configuration file (by default, in /etc/snmp) are 640 or more restrictive Ensure that any MIB files permissions are also 640 or more restrictive B. Permission and File Ownership Recommendations Resource Owned Group-owned Mode system audit logs root root, bin, sys, or system 0640 top-level directories like /var, /usr, /sbin, /sys root account's home directory (other than /) root root 0700 time synchronization configuration file (such root root, bin, sys, or system 0640 as /etc/ntp.conf) network services daemon files 0755 system command files system system group 0755 account system log files 0640 library files 0644 NIS/NIS+/yp files root, sys, or root, sys, bin, other, or system 0755 bin /etc/resolv.conf file root root, bin, sys, or system 0644 /etc/hosts file /etc/nsswitch.conf file /etc/passwd file /etc/group file /etc/shadow file root root, bin, sys, or system 0400 user home directories respective owner s primary group 0750 user files and directories contained in user home directories group of which the home directory's owner is a member system start-up files root root, sys, bin, other, or system global initialization files root root, sys, bin, other, system or the 0644 system default skeleton files root or bin root, bin, sys, system, or other 0644 (typically those in /etc/skel) local initialization files user or root user's primary group or root 0740 shell files root or bin root, bin, sys, or system Public directories root or an root or an application group Copyright Cisco Public
20 application account cron.allow root, bin, or root, bin, sys, or cron 0600 sys crontab files 0600 files in cron script directories 0700 cron and crontab root or bin root, sys, bin or cron 0755 cronlog 0600 cron.deny root, bin, or root, bin, sys, or cron 0700 sys at.deny root, bin, or root, bin, sys, or cron 0600 sys at.allow root, bin, or root, bin, sys, or cron 0600 sys "at" directory root, bin, or sys root, bin, sys, or cron 0755 alias file root root, sys, bin, or system 0644 snmpd.conf root root, bin, sys, or system 0600 Management Information Base (MIB) files 0640 /etc/syslog.conf file root root, bin, sys, or system 0640 SSH public host key files 0644 SSH private host key files 0600 Table 1: Permission and Ownership Recommendations File permissions for user, group, and others are checked and set using the chmod command. The following example grants read, write, and execute permissions to the owner of the file. It also grants only read and execute permissions to group and other: % chmod 755 file Because of the user, group, and other tuple in POSIX permissions, the file owner directly affects how permissions dictate the ability to perform certain actions on a file or directory. To change the file owner, use the chown command. The following example changes the file owner to another-user: % chown another-user file To change the group owner, use the chgrp command. The following example sets the group owner to new-group: % chgrp new-group file C. Disable Root Shell This section outlines configurations to restrict shell access in well-known Linux services. Copyright Cisco Public
21 Linux Services To prevent gdm, kdm, login, xdm, su, ssh, scp, and sftp from gaining root shell access, change root's shell to /sbin/nologin in the /etc/passwd file (nologin may be in /usr/sbin/nologin, depending on the system.) [4]. Console Devices To disable root access via any console device (tty), remove lines in the /etc/securetty file that grant root access to specific devices [6, 10, 23]. OpenSSH To disable root shell access for ssh, add the following line in /etc/ssh/sshd_config file 18] : [2, 3, 4, 10, PermitRootLogin no FTP Server To disable shell access to the ftp user account, set the shell to /bin/false and /bin/nologin or /usr/sbin/nologin. D. Secure Run-time Kernel Configuration Run-time kernel parameters can be enabled/disabled by modifying the /etc/sysctl.conf file. Kernel parameters can also be set at run-time using the sysctl command. However, parameters that are set using the sysctl command are nullified during a system shutdown or restart. Unlike the sysctl command, kernel parameters in the /etc/sysctl.conf file are set at boot-time, thus persist through system shutdowns and restarts. The following are recommendations for Linux kernel settings. These parameters are set in /etc/sysctl.conf [1, 2, 4, 6] : # Controls the System Request debugging functionality of the kernel kernel.sysrq = 0 # Controls whether core dumps will append the PID to the core filename # Useful for debugging multi-threaded applications kernel.core_uses_pid = 1 ########## IPv4 networking ############## # Unless system is going to be used as a firewall # or gateway to pass IP traffic between different networks net.ipv4.conf.all.send_redirects = 0 net.ipv4.conf.default.send_redirects = 0 Copyright Cisco Public
22 # Accept packets with SRR option? No net.ipv4.conf.all.accept_source_route = 0 # Disable Accept Redirects net.ipv4.conf.all.accept_redirects = 0 net.ipv4.conf.all.secure_redirects = 0 # Log packets with impossible addresses to kernel log net.ipv4.conf.all.log_martians = 1 net.ipv4.conf.default.accept_redirects = 0 net.ipv4.conf.default.secure_redirects = 0 # Ignore all ICMP ECHO and TIMESTAMP requests sent to it via broadcast/multicast net.ipv4.icmp_echo_ignore_broadcasts = 1 # Prevent against the common 'syn flood attack' net.ipv4.tcp_syncookies = 1 # Controls IP packet forwarding net.ipv4.ip_forward = 0 # Do not accept source routing net.ipv4.conf.default.accept_source_route = 0 ########## IPv6 networking ############## net.ipv6.conf.all.accept_source_route=0 net.ipv6.conf.default.accept_redirects = 0 net.ipv6.conf.default.secure_redirects = 0 # net.ipv6.conf.default.max_addresses should be set to # the number of ipv6 addresses that should be assigned to # the interface. net.ipv6.conf.default.max_addresses = 1 The following additional kernel parameters should be set in the kernel configuration file (file location can vary by distribution) [5] : # Enable -fstack-protector buffer overflow detection # As of Linux 3.0, this only enables overflow protection for x86 and ARM. # This excludes x86 and MIPS CONFIG_CC_STACKPROTECTOR=y # Write protect kernel read-only data structures # As of Linux 3.0, this only impacts x86 and PARISC CONFIG_DEBUG_RODATA=y Copyright Cisco Public
23 E. Grsecurity Configuration Recommended grsecurity settings are below [18] : # Disable writing to kmem/mem/port CONFIG_GRKERNSEC_KMEM=y #Disable privileged I/O # CONFIG_GRKERNSEC_IO will break XFree86. CONFIG_GRKERNSEC_IO=y #Harden module auto-loading CONFIG_GRKERNSEC_MODHARDEN=y # Hide kernel symbols CONFIG_GRKERNSEC_HIDESYM=y Copyright Cisco Public
Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux
Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux André Carrington, P.Eng, CISSP, CISM Unix experience: 13 years SunOS; NeXTSTEP; Sun Interactive; Wyse Unix; BSD; Solaris; QNX; HP-UX;
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
Configuring Secure Linux Hosts
A Perspective on Practical Security 2005 by Landon Curt Noll BOSTON NEW YORK SAN FRANCISCO SACRAMENTO CHARLOTTE WASHINGTON DC Introduction Congratulations! You have just installed Linux; an Open Source
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
Features. The Samhain HIDS. Overview of available features. Rainer Wichmann
Overview of available features November 1, 2011 POSIX (e.g. Linux, *BSD, Solaris 2.x, AIX 5.x, HP-UX 11, and Mac OS X. Windows 2000 / WindowsXP with POSIX emulation (e.g. Cygwin). Please note that this
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
CUIT UNIX Standard Operating Environment and Security Best Practices
Objective and Scope Effective Date: August 2008 This CUIT UNIX Standard Operating Environment (SOE) document defines the agreed system hardening requirements as well as security best practices for CUIT
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Linux Server Configuration Guidelines
Linux Server Configuration Guidelines This document is meant to be a living document and intended to accompany more detailed, step- by- step resources. Suggestions in this document are taken from administrators
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
How To Harden An Hp Server For A Long Time
Linux Security on HP Servers: General Security Topics Technical introduction This white paper discusses general security technologies available in Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise
Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent
T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
NETWORK SECURITY HACKS
SECOND EDITION NETWORK SECURITY HACKS 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Andrew Lockhart O'REILLY Beijing
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
Chapter 15 Operating System Security
Operating Systems: Internals and Design Principles Chapter 15 Operating System Security Eighth Edition By William Stallings System Access Threats System access threats fall into two general categories:
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Securing Linux. Presented by: Darren Mobley
Securing Linux Presented by: Darren Mobley Introduction Hello, My name is Darren Have been supporting and developing cpanel for over 4 years. We'll be covering some steps to take to help protect servers
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
VMware ESX Server 3 Configuration Guide
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
Advanced Linux System Administration on Red Hat
Advanced Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with basic Linux administration (i.e., they know users, packages,
Hardening Linux. and introducing Securix GNU/Linux
Hardening Linux and introducing Securix GNU/Linux Hardening basics From lowest to highest level Tune every part of system and applications Follow standards and security policies Regularly check system
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Network Infrastructure Security Recommendations
Hardening Red Hat Enterprise Linux Ensure that file systems with user-writeable directories (ie /home, /tmp, /var/tem) are mounted on separate partitions. Ensure updates are applied as soon as they become
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
SPECIFICATION PROFILE BOKS SERVERCONTROL. Fox Technologies, Inc. www.foxt.com [email protected] 616.438.0840
SPECIFICATION PROFILE BOKS SERVERCONTROL Fox Technologies, Inc. www.foxt.com [email protected] 616.438.0840 Spec Profile: BoKS ServerControl BoKS ServerControl provides a centralized source for managing access
LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes
LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
Traditional Rootkits Lrk4 & KNARK
Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
J-202. IT 4823 Information Security Administration. Linux Security Model. Linux Security. In Room. Linux Security April 23
Final Exam Final exam date: May 5, 4:00 5:50 PM. IT 4823 Information Security Administration Linux Security April 23 In Room J-202 Notice: This session is being recorded. Lecture slides prepared by Dr
LINUX NETWORK SECURITY
LINUX NETWORK SECURITY PETER G. SMITH CHARLES CHARLES RIVER MEDIA, INC. Hingham, Massachusetts Contents Preface xvii 1 Introduction: The Need For Security 1 1.1 Introducing the Enemy 1 The Hacker Myth
Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85
Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
A candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid
Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami
TFS UnixControl White Paper
White Paper Consolidate and simplify UNIX system management with TFS UnixControl TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 TFS UnixControl Functionality 3 System Architecture
Linux OS-Level Security Nikitas Angelinas MSST 2015
Linux OS-Level Security Nikitas Angelinas MSST 2015 Agenda SELinux SELinux issues Audit subsystem Audit issues Further OS hardening 2 SELinux Security-Enhanced Linux Is NOT a Linux distribution A kernel
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
Basic Installation of the Cisco Collection Manager
CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
GLS250 "Enterprise Linux Systems Administration"
GLS250 "Enterprise Linux Systems Administration" Intended for students already comfortable with working in the Unix environment, this in-depth course helps students acquire the variety of skills needed
Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview
Hervey Allen Network Startup Resource Center PacNOG 6: Nadi, Fiji Security Overview Security: A Massive Topic Security Viewpoints - Server - Client - Network Securing each overlaps the other Server Client
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Table of Contents. Introduction. Audience. At Course Completion. Prerequisites
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This in-depth, 5-day course helps students acquire
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2007 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING THIRD-PARTY
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Red Condor Syslog Server Configurations
Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail
About Microsoft Windows Server 2003
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
Local File Sharing in Linux
Local File Sharing in Linux Would you like to share files among multiple users on the same Linux system? Surprisingly, this is trickier to accomplish than it appears, so here is a method that works. The
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Best Practices Guide for NerveCenter System and Security Administrators. Windows and UNIX Version 5.x Version 6.x. July 2011 NCBPSA5200-05
Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x Version 6.x July NCBPSA5200-05 Copyright Portions Copyright 1989- LogMatrix, Inc. / OpenService, Inc.
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
Oracle Linux 7: System Administration Ed 1 NEW
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Linux 7: System Administration Ed 1 NEW Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training
ENTERPRISE LINUX SYSTEM ADMINISTRATION
ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation
static void insecure (localhost *unix)
static void insecure (localhost *unix) Eric Pancer [email protected] Information Security Team DePaul University http://infosec.depaul.edu Securing UNIX Hosts from Local Attack p.1/32 Overview
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator
