For information about the way that you can configure the security of an Oracle Linux system, see Chapter 3, Implementing Oracle Linux Security.
For guidelines about hardening an Oracle Linux system, see Chapter 5, Secure Deployment Checklist.
Copyright © 2013, 2016, Oracle and/or its affiliates. All rights reserved. Legal Notices