International Journal of Computer Applications
The security of Linux depends on many configuration file both at system level and application level. Most important is security of the Linux system is never static. Once the user secure their Linux system it does not perpetually stay secure because operational and functional changes had done through threats or new exploits are available for packages or applications hence need of secure system. This paper is securing Linux production system. There are many Linux security requirements that need to pass various audits in an enterprise.