Chapter 11: UNIX and Linux Security

Gerald Beuchelt     Demandware, Inc., Burlington, MA, United States

Abstract

There are many objectives and goals to be considered when securing a UNIX operating system. When configuring UNIX operating system security, consider these critical principals of security, known as the confidentiality, integrity, and availability (CIA) triad. In addition to incorporating security controls that relate to the CIA triad, three additional security features directly affect CIA and aid the overall site security program: access control, auditing, and backups. Although general UNIX considerations are covered in this chapter, it also addresses several Linux-specific items. This chapter is for all Linux variants; file names, directory ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.