Synopses & Reviews
“The proactive attitude towards implementing security, combined with the authors’ time-tested methods, are sure to produce dramatic results!” --Dave Wreski, CEO, Guardian Digital & co-author of Linux Security HOWTO
Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks--before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red Hat Enterprise Linux AS 3.0, and Novell’s SUSE Linux versions SLES8 and SLES9. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.
Features a four-part hardening methodology:
- Do This Now!--Important steps to lockdown your system from further attack
- Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on network access, software accessibility, data access, storage, and communications
- Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management, auditing, and log file scanning
- How to Succeed at Hardening Your Linux Systems--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program
John H. Terpstra is co-founder of the Samba Team and serves on the Linux Standards Base. He previously worked as VP of Technology for Caldera, and VP of Development for Turbolinux. Paul Love, CISSP, CISA, CISM, Security+, is technical editor for more than 10 best selling Linux and Unix books. He manages security at a large utilities service provider, and holds an MS in Network Security. Ronald P. Reck’s experience blends linguistics, NLP, and XML with UNIX systems. As a civilian contractor, he tackles large computational problems for distinguished clientele. Tim Scanlon recently worked on computer security for the 2004 Olympic Games. He has been a Common Criteria instructor, and has worked at MCI, TRW, Signal Corporation, and Inter.Net Global. He has worked in the public sector and with Mitre and Mitretek. Series Editor Roberta Bragg, CISSP, Security+, writes a column for the Security Watch newsletter, and is the author of Hardening Windows Systems and several other information security books.
Synopsis
Key Features and Benefits- No more "hack and patch!' Harden your Linux system before it is hacked. "Do this NOW, here's why, here's how and don't stop there!"- Administrators and IT Pros have to do more with less. They don't want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. "Hacking Exposed Linux shows how to test, hack, and find the security holes and fix them. Hardening Linux shows you how to secure your Linux system to work securely in the first place.- Blog: Living content: Roberta Bragg will monitor and maintain a Blog for Hardening readers to receive updates, alerts, new information, guidance, contacts, build community around the series, etc.
Synopsis
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed, here is a brilliant new offering written with a passion for security that will help you make the necessary upgrades and take the essential steps to secure your Linux systems. The concise and consistent approach breaks down security into logical parts, giving you actions to take immediately, information on hardening your system from the top down, how to plan and maintain an interative security strategy and finally, how to navigate the "soft issues" of how to garner management and employee support for your security strategy. Features examples in the most frequently used enterprise Linux distributions, Red Hat Enterprise Server 3.0, SuSE SLES 8.1 and a sneak preview of SuSE SLES 9.0
Table of Contents
Part I: Do These Seven Things First
Chapter 1: Critical First StepsPart II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Hardening Network Access: DisableUnnecessary ServicesChapter 3: Installing Firewalls and FiltersChapter 4: Hardening Software AccessibilityChapter 5: Preparing for DisasterChapter 6: Hardening Access ControlsChapter 7: Hardening Data StorageChapter 8: Hardening Authentication and User IdentityChapter 9: Restricted Execution EnvironmentsChapter 10: Hardening CommunicationsPart III: Once Is Never Enough!
Chapter 11: Install Network Monitoring SoftwareChapter 12: Automatic Logfile ScanningChapter 13: Patch Management and MonitoringChapter 14: Self-Monitoring ToolsPart IV: How to Succeed at Hardening Linux
Chapter 15: Budget Acquisition and CorporateCommitment to SecurityChapter 16: Establishing a Security CampaignAppendix A: Additional Linux Security Resources