Securing Linux Policy
Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades.
This policy, written by Scott Matteson for TechRepublic Premium, provides guidelines for securing Linux on company computers and computers used to conduct company business. It assumes administrative knowledge of Linux servers and/or workstation environments.
- Featured text from the download:
DESIGNATE RESPONSIBLE INDIVIDUALS/GROUPS
Specific individuals or groups should be designated to analyze, modify (if necessary), enact, and otherwise bear responsibility for the details of this policy. Examples include IT and security staff (or those entire departments) and stakeholders from other departments. These stakeholders may be VPs, managers, or technologically savvy individuals who can provide input on their respective needs.
DEVELOP TEMPLATES BASED ON SYSTEM/USER ROLES
Security templates (which can be as simple as a list of recommended settings or as complex as system images or policies that can be applied to servers or workstations) should be developed based upon system and user roles. You must establish these roles to proceed.
Improve your business operations with our nine-page document. Previously priced at $19, this is now available for download at just $9. Alternatively, enjoy complimentary access with a Premium annual subscription.
TIME SAVED: Crafting this content required 18 hours of dedicated writing, editing, research, and design.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.