The software described in this documentation is either in Extended Support or Sustaining Support. See https://www.oracle.com/us/support/library/enterprise-linux-support-policies-069172.pdf for more information.
Oracle recommends that you upgrade the software described by this documentation as soon as possible.
Table of Contents
- 25.1 About System Security
- 25.2 Configuring and Using SELinux
- 25.3 About Packet-filtering Firewalls
- 25.4 About TCP Wrappers
- 25.5 About chroot Jails
- 25.6 About Auditing
- 25.7 About System Logging
- 25.8 About Process Accounting
- 25.9 Security Guidelines
- 25.9.1 Minimizing the Software Footprint
- 25.9.2 Configuring System Logging
- 25.9.3 Disabling Core Dumps
- 25.9.4 Minimizing Active Services
- 25.9.5 Locking Down Network Services
- 25.9.6 Configuring a Packet-filtering Firewall
- 25.9.7 Configuring TCP Wrappers
- 25.9.8 Configuring Kernel Parameters
- 25.9.9 Restricting Access to SSH Connections
- 25.9.10 Configuring File System Mounts, File Permissions, and File Ownerships
- 25.9.11 Checking User Accounts and Privileges
This chapter describes the subsystems that you can use to administer system security, including SELinux, the Netfilter firewall, TCP Wrappers, chroot jails, auditing, system logging, and process accounting.