Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12
|
|
|
- Meredith King
- 10 years ago
- Views:
Transcription
1 Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12 Craig Gardner Software Engineer SUSE
2 Overview What? and Why? New for SUSE Linux Enterprise Server 12 Architecture Dive: Inspection Tools 2
3 What? and Why? What Should Security Be?
4 What is Security? Good software......does what you expect it to do, and does it well. Secure software......is good software that does nothing else. 4
5 What to Do? Software contains errors Malfunctions Crashes Downtime Security Vulnerabilities Data loss and disclosure, identity theft, system abuse, privilege transition Apply Maintenance Updates Nowhere is this more evident than with POODLE and SHELLSHOCK 5
6 A Closer Look Administration Purpose, responsibilities, mandates, team play Infrastructure Network and network boundaries, services Security Zones Assets and protection, domains, domain transitions Systems Deployment, installation, configuration (hardening), monitoring, maintenance, auditing 6
7 A Closer Look Administration Purpose, responsibilities, mandates, team play Infrastructure Network and network boundaries, services Security Zones Assets and protection, domains, domain transitions Systems Deployment, installation, configuration (hardening), monitoring, maintenance, auditing 7
8 Security Considerations for SUSE Linux Enterprise Server 12
9 Security Standards Compliance Upcoming Common Criteria Certification 9 EAL4+ expected ( under evaluation ) Upcoming FIPS validation OpenSSL OpenSSH client and server Strongswan Kernel Crypto API libgcrypt
10 SUSE Linux Enterprise 12 Changes Related to Security 10 SCC Registration 2nd action after accepting the license Important for getting security updates immediately Updates from SCC, SMT, or Manager No more Stage 2 installation Create New User and root password in stage 1 No more blowfish; default is sha512 Simplification; Flexibility
11 SUSE Linux Enterprise 12 Changes Related to Security TLS 1.2 support for all services Grub2 UEFI Secure Boot SELinux returns systemd journald and journalctrl 11 Tamper resistant local logging
12 SUSE Linux Enterprise 12 Changes Related to Security Built Upon Proven SUSE Linux Enterprise 11 12
13 Inspection, Configuration, Hardening
14 DMZ 0 Shuttle Networks DMZ 1 Inner Networks Admin Network 14
15 Screenshots
16 16
17 17
18 18
19 19
20 20
21 21
22 22
23 23
24 24
25 25
26 26
27 27
28 28
29 29
30 30
31 31
32 YaST Security Center and Hardening
33 33
34 What Security Center Does In the Background Run another YaST module Change settings in files in /etc/sysconfig Modify configuration files directly 34
35 Architecture and Design
36 Schematical Overview: system calls KDE proc, sys User-land processes VFS ext3 reiserfs vfat NFS (mount table) sd sg ICMP UDP Physics/Electronics aic7xxx Kernel-land drivers, kernel threads IP eth0 ppp0 BT USB SCSI SCSI 36 TCP PCI Serial Shell device files Libraries Human O/S Kernel + Userland
37 Inspection Approach your system as if you were an attacker: network 37 ports services processes files kernel
38 Network Interface addresses: all interfaces enabled and conn.? Routing setup: IP-forwarding on/off? Netfilter rules: active, any? maintain ARP table records Other tweakables: txqueuelen, mtu ICMP replies, ICMP redirects ECN slow-start 38
39 Ports port scan: Open TCP and UDP sockets nmap -ss -v -O ip.address.on.network Compare to output of netstat -anpl Discrepancies...? (Not all services are userland process bound! (knfsd)) Watch out for UDP sockets! 39
40 Services Disable all services that are not needed, permanently Remove the runlevel symlinks (insserv -r <servicename>) Kill the servers (rcapache2 stop) Verify if they the services are really dead! Remove the packages from the system? 40
41 Processes Get to know all processes on your system in person... ps faux rpm -qfi /usr/sbin/nscd...and deactivate whatever is not needed running. 41
42 Files Permissions: /etc/permissions* from /etc/sysconfig/security Use chkstat -set <permissions file> or SuSEconfig find / /usr... -mount -type f \( -perm o -perm \) -ls PolKit and default rules in /etc/polkit-default-privs.* Integrity measures: AIDE, RPM maintain offsite RPM database backup for maintain offsite AIDE database backup mount options: /etc/fstab, /proc/mounts 42 rpm -Va
43 Kernel: Use AppArmor! Example profile: dhcp daemon #include <tunables/global> /usr/sbin/dhcpd { #include <abstractions/base> #include <abstractions/nameservice> capability dac_override, capability net_bind_service, capability net_raw, capability setgid, capability setuid, capability sys_chroot, } 43 /db/dhcpd.leases* lrw, /etc/dhcpd.conf r, /etc/hosts.allow r, /etc/hosts.deny r, /usr/sbin/dhcpd rmix, /var/lib/dhcp/dhcpd.leases* rwl, /var/lib/dhcp/etc/dhcpd.conf r, /var/run/dhcpd.pid wl,
44 Kernel: We support SELinux (again!) Many government contracts require SELinux A lot the same,but different Starts everything off with high protection settings (MAC = Mandatory Access Control) SUSE Linux Enterprise 12 brings back the choice 44
45 Tools
46 Tools The YaST Security Center The YaST AppArmor profile generator Integrity: AIDE and RPM Port Scanner: nmap Vulnerability scanner: openscap + OVAL 46
47 More Tools, More Considerations System Monitoring: Nagios, Ganglia Syslog Monitoring: logwatch, Sentinel Vulnerability Scanner: openvas, tripwire Configuration Management: puppet, chef, cfengine, or SUSE Manager 47
48
49 Unpublished Work of SUSE. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE
Operating System Security Hardening for SAP HANA
Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance [email protected] Markus Gürtler Architect & Technical Manager SAP Linux Lab [email protected] Corporate
SUSE Linux Enterprise 12 Security Certifications
SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security [email protected] 2 Evaluation Validation
Advanced Systems Management with Machinery
Advanced Systems Management with Machinery Andreas Jaeger Thomas Göttlicher Senior Product Manager [email protected] Software Engineer [email protected] Who Are We? Andreas Jaeger Product Manager Thomas
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise [email protected] Agenda Evaluation
Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <[email protected]>
Relax-and-Recover on SUSE Linux Enterprise 12 Johannes Meixner Topics What is Relax-and-Recover? What means disaster recovery here? How does disaster recovery work? How does Relax-and-Recover
SUSE Customer Center Roadmap
SUSE Customer Center Roadmap Simona Arsene Product Manager Services Artem Chernikov Engineer Cloud & System Management Agenda SCC Today Live Demo of SCC Registration Process New features 2 1 Nov 2012 Alpha
Implementing Linux Authentication and Authorisation Using SSSD
Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Enterprise Service and Integration Specialist Technology Transfer Partnership (TTP) [email protected] Mark Robinson
Wicked A Network Manager Olaf Kirch
Wicked A Network Manager Olaf Kirch Director SUSE Linux Enterprise [email protected] 2 Agenda Why Wicked!? What we want to achieve What Wicked can do today/tomorrow Architecture Wicked little intro Why Wicked!?
Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256
Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Brad DesAulniers Senior Software Engineer [email protected] @cb_brad Ryan Hodgin Senior IT Architect [email protected]
How To Make A Cloud Work For You
OpenStack Deep Dive Alan Clark OpenStack, Chairman of the Board Director, SUSE [email protected] Community Size Q2 2014 ECOSYSTEM SIZE (Members + Sponsors + Supporters) 390 Companies Members: 26 Sponsors:
Btrfs and Rollback How It Works and How to Avoid Pitfalls
Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server [email protected] rm -rf /? I will be discussing what is needed for rollback: Btrfs /
Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect [email protected]
Public Cloud Build, Use, Manage Robert Schweikert Public Cloud Architect [email protected] Public Cloud Build, Use, Manage Introduction About me Disclaimers Build vs. Ready made What do I... Now what?
Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales
Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales Patrick Mullin Scott Steele Senior Technical Specialist SUSE Consulting [email protected] Point of Sale Manager National Vision, Inc. [email protected]
Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management
Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Stefan Stiehl Senior Technology Sales Specialist Identity Security Management [email protected]
Software Defined Everything
Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager [email protected] Joachim Werner Senior Product Manager [email protected] Data Center History - 1970s One (big)
SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE [email protected]
SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack Gábor Nyers Sales Engineer @SUSE [email protected] Introductory video ChalkTalk: SUSE OpenStack Cloud 2 Stetting the Stage for SUSE OpenStack
DevOps and SUSE From check-in to deployment
DevOps and SUSE From check-in to deployment Rodolfo Bejarano SUSE Systems Engineer [email protected] Rick Ashford SUSE Systems Engineer [email protected] 2 Agenda 3 Introductions Development
Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen [email protected]
Big Data, SAP HANA SUSE Linux Enterprise Server for SAP Applications Kim Aaltonen [email protected] 2 Agenda 3 Big Data SAP HANA Optimized Linux for SAP Why SUSE for SAP? Summary 4 5 Big Data What
Using btrfs Snapshots for Full System Rollback
Using btrfs Snapshots for Full System Rollback Matthias G. Eckermann Senior Product Manager [email protected] Enterprise End User Summit, New York, June 2014 2014-06-20 15:44 UTC Why this? Minimizing Downtime
Challenges Implementing a Generic Backup-Restore API for Linux
Challenges Implementing a Generic Backup-Restore API for Linux Matthias G. Eckermann Senior Product Manager [email protected] Vault, Boston, March 2015 2015-03-12 13:45 UTC Picture: "Escribano" by Jean Le Tavernier
We are watching SUSE
We are watching SUSE Monitoring at SUSE and in SUSE Linux Enterprise Server 12 Martin Čaj Linux System Administrator Prague Czech Republic [email protected] Joachim Werner Senior Product Manager Nürnberg Germany
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad VP, Platform Evangelism WSO2 [email protected] Section Break Text Here (32pt) Cloudy Goals Improve efficiency and
Configuration Management in SUSE Manager 3
Configuration Management in SUSE Manager 3 TUT20515 Klaus Kämpf Product Owner, SUSE Manager [email protected] Agenda 2 SUSE Manager 3 themes About Configuration Management Choosing the right stack Getting
Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project
Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Ralf Bueker DSE Bundesagentur für Arbeit [email protected] What is a DSE? DSE means
Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW
Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Andreas Pöschl, BMW Senior Solutions Architect [email protected] Michael Vonderbecke, BMW Solutions Architect [email protected]
kgraft Live patching of the Linux kernel
kgraft Live patching of the Linux kernel Vojtěch Pavlík Director SUSE Labs [email protected] Why live patching? Common tiers of change management: 1. Incident response (we're down, actively exploited )
HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse.
HO15982 Deploy OpenStack The SUSE OpenStack Cloud Experience Alejandro Bonilla Sales Engineer [email protected] Michael Echavarria Sales Engineer [email protected] Cameron Seader Sales Engineer [email protected]
High Availability Storage
High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated
How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open
How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open Simon Briggs Technology Specialist [email protected] Open Source = openmind 3 Protect Investment & Work Together 4 Cloud Definitions
Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction
Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Arun Singh Sr. Technical Manager [email protected] Agenda 2 Introduction SUSE Components Oracle
SUSE Linux uutuudet - kuulumiset SUSECon:sta
SUSE Linux uutuudet - kuulumiset SUSECon:sta Olli Tuominen Technology Specialist [email protected] 2 SUSECon 13 4 days, 95 Sessions Keynotes, Breakout Sessions,Technology Showcase Case Studies, Technical
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer [email protected] Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop
SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE [email protected]
SUSE Enterprise Storage Highly Scalable Software Defined Storage Gábor Nyers Sales Engineer @SUSE [email protected] Setting the Stage Enterprise Data Capacity Utilization 1-3% 15-20% 20-25% Tier 0 Ultra
Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows
Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Gábor Nyers Systems Engineer @SUSE [email protected] Agenda 14:00 Kangaroot Update SUSE Update Data Center Interoperability the
SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris
SUSE FUT7537 Software Defined Introduction and Roadmap: Getting your tentacles around data growth Larry Morris Sr. Product Manager [email protected] AGENDA Enterprise Market SUSE Product SUSE Solutions
High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications
High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications Uwe Heinz Product Manager SAP [email protected] Fabian Herschel Senior Architect SAP LinuxLab
Oracle Products on SUSE Linux Enterprise Server 11
Oracle Products on SUSE Linux Enterprise Server 11 Technical Introduction Arun Singh Sr. Technical Manager [email protected] Agenda Introduction SUSE Products Oracle Products Road Map Question and Answer
CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School
CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School Don Vosburg Systems Engineer [email protected] [email protected] Who is
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
RedHat (RHEL) System Administration Course Summary
Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with
GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days
GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course
HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer [email protected]
HO5604 Deploying MongoDB A Scalable, Distributed Database with SUSE Cloud Alejandro Bonilla Sales Engineer [email protected] Agenda SUSE Cloud Overview What is MongoDB? 2 Getting familiar with the Cloud
Deploying Hadoop with Manager
Deploying Hadoop with Manager SUSE Big Data Made Easier Peter Linnell / Sales Engineer [email protected] Alejandro Bonilla / Sales Engineer [email protected] 2 Hadoop Core Components 3 Typical Hadoop Distribution
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell.
File Management Suite Novell Intelligently Manage File Storage for Maximum Business Benefit Sophia Germanides [email protected] David Condrey [email protected] Agenda Customer Challenges
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
Wicked Trip into Wicked Network Management
Wicked Trip into Wicked Network Management Matthias G. Eckermann Senior Product Manager [email protected] LinuxCon 2013 NA 2013-09-12 15:40 UTC Some Words of Encouragement There is a theory which states, that
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
Novell Collaboration Vibe OnPrem
Novell Collaboration Vibe OnPrem Evergreen Preview Corne Groesbeek Open Horizons Tracy Smith Product Manager [email protected] Collaboration Solutions Collaboration solutions from Novell help enterprise
ENTERPRISE LINUX SYSTEM ADMINISTRATION
ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation
Of Pets and Cattle and Hearts
Of Pets and Cattle and Hearts The SUSE Systems Management Story Joachim Werner Senior Product Manager, SUSE [email protected] Who am I? 2 SUSE and Linux Workloads in the Enterprise SUSE Studio Datacenter Private
SUSE Cloud 5 Private Cloud based on OpenStack
SUSE Cloud 5 Private Cloud based on OpenStack Michał Jura Senior Software Engineer Linux HA/Cloud Developer [email protected] 2 New solutions emerge: Infrastructure-as-Service Cloud = 3 SUSE Cloud Why OpenStack?
Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs [email protected]
Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs [email protected] Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
Yosemite Server Backup Installation Guide
Yosemite Server Backup Installation Guide Part number: First edition: October, 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
How SUSE Is Helping You Rock The Public Cloud
How SUSE Is Helping You Rock The Public Cloud James Mason Robert Schweikert Technical Architect, Public Cloud [email protected] Public Cloud Architect [email protected] Topics 2 A very quick and brief Public
NetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
Novell Identity Manager Resource Kit
AUTHORIZED DOCUMENTATION Installation Guide for SUSE Linux Enterprise Server 10 SP2 Novell Identity Manager Resource Kit 1.2 August 17, 2009 www.novell.com Identity Manager Resource Kit 1.2 Installation
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Introducing Director 11
Introducing Director 11 Agenda Director 11 Introduction Mobile Certificate Manager - CA Import - Mobile Device Management (MDM) Integration - New Certificate Types - User Certificate Mapping - Single-
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
TUT19344 Managing RH/CentOS with SUSE Manager
TUT19344 Managing RH/CentOS with SUSE Manager Don Vosburg Systems Engineer [email protected] Gokhan Cetinkaya Systems Engineer [email protected] Agenda SUSE Manager overview SUSE Manager and non-suse
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family
Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family *5991-5301* Part number: 5991-5301 Edition: 3, E0406 Copyright 2006 Hewlett-Packard Development
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
RSA Security Analytics. S4 Broker Setup Guide
RSA Security Analytics S4 Broker Setup Guide Copyright 2010-2013 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks
Linux w chmurze publicznej SUSE na platformie Microsoft Azure
Linux w chmurze publicznej SUSE na platformie Microsoft Azure Grzegorz Piotrowski Solution Architect C2O C EH, ISO27001-2, ITIL SM, PMI P2, MCT CCEE Virtualization MCSE Private Cloud VCA Cloud [email protected]
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension
CAS7318 A Geo Redundant Cloud VoIP Service Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension Brett Buckingham Managing Director, silhouette Research and Development Broadview
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
GLS250 "Enterprise Linux Systems Administration"
GLS250 "Enterprise Linux Systems Administration" Intended for students already comfortable with working in the Unix environment, this in-depth course helps students acquire the variety of skills needed
The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org
The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services
Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Max Walker Manager, Novell Services [email protected] 30 May 2008 Agenda SCP at Novell Services Global Documentation
Document Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Abstract. Microsoft Corporation Published: November 2011
Linux Integration Services Version 3.2 for Hyper-V (Windows Server 2008, Windows Server 2008 R2, Microsoft Hyper-V Server 2008, and Microsoft Hyper-V Server 2008 R2) Readme Microsoft Corporation Published:
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
