Chapter 3 Implementing Oracle Linux Security

Table of Contents

3.1 Configuring and Using Data Encryption
3.2 Configuring a GRUB Password
3.3 Configuring and Using Certificate Management
3.3.1 About the openssl Command
3.3.2 About the keytool Command
3.4 Configuring and Using Authentication
3.4.1 About Local Oracle Linux Authentication
3.4.2 About IPA
3.4.3 About LDAP Authentication
3.4.4 About NIS Authentication
3.4.5 About Winbind Authentication
3.4.6 About Kerberos Authentication
3.5 Configuring and Using Pluggable Authentication Modules
3.6 Configuring and Using Access Control Lists
3.7 Configuring and Using SELinux
3.7.1 About SELinux Administration
3.7.2 About SELinux Modes
3.7.3 Setting SELinux Modes
3.7.4 About SELinux Policies
3.7.5 About SELinux Context
3.7.6 About SELinux Users
3.8 Configuring and Using Auditing
3.9 Configuring and Using System Logging
3.10 Configuring and Using Process Accounting
3.11 Configuring and Using Software Management
3.11.1 Configuring Update and Patch Management
3.11.2 Installing and Using the Yum Security Plugin
3.12 Configuring Access to Network Services
3.12.1 Configuring and Using Packet-filtering Firewalls
3.12.2 Configuring and Using TCP Wrappers
3.13 Configuring and Using Chroot Jails
3.13.1 Running DNS and FTP Services in a Chroot Jail
3.13.2 Creating a Chroot Jail
3.13.3 Using a Chroot Jail
3.14 Configuring and Using Linux Containers
3.15 Configuring and Using Kernel Security Mechanisms
3.15.1 Address Space Layout Randomization
3.15.2 Data Execution Prevention
3.15.3 Position Independent Executables

This chapter describes the various ways in which you can configure the security of an Oracle Linux system.