So you think the systems at your employer can actually use a little bit more security? Or what about your own system to gain more privacy? In this talk, we discuss the reasons for Linux server and system hardening. First we learn why we should protect our crown jewels, and what can wrong if we ignore information security. Next is getting a better understanding of the possible resources we can use. And since system hardening can be time-consuming, we discuss some tools to help in the system hardening quest.
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Linux Hardening
1. Linux Hardening
Locking Down Linux To Increase Security
‘s-Hertogenbosch, 1 March 2016
Meetup: Den Bosch Linux User Group
Michael Boelen
michael.boelen@cisofy.com
2. Goals
1. Learn what to protect
2. Know some strategies
3. Learn tooling
Focus: Linux
2
33. Hardening Guides
Pros
Free to use
Detailed
You are in control
33
Cons
Time intensive
Usually no tooling
Limited distributions
Delayed releases
Missing follow-up
43. SCAP features
● Common Vulnerabilities and Exposures (CVE)
● Common Configuration Enumeration (CCE)
● Common Platform Enumeration (CPE)
● Common Vulnerability Scoring System (CVSS)
● Extensible Configuration Checklist Description Format (XCCDF)
● Open Vulnerability and Assessment Language (OVAL)
Starting with SCAP version 1.1
● Open Checklist Interactive Language (OCIL) Version 2.0
Starting with SCAP version 1.2
● Asset Identification
● Asset Reporting Format (ARF)
● Common Configuration Scoring System (CCSS)
● Trust Model for Security Automation Data (TMSAD)
43