Table of Contents
- Title and Copyright Information
 - Preface
 - 1 About System Security
 - 
               
               
                  
                  2
                      Security Guidelines
               
                  
               
               
               
- Minimizing the Software Footprint
 - Configuring System Logging
 - Disabling Core Dumps
 - Minimizing Active Services
 - Locking Down Network Services
 - Configuring a Packet-Filtering Firewall
 - Configuring TCP Wrappers
 - Configuring Kernel Parameters
 - Restricting Access to SSH Connections
 - Configuring File System Mounts, File Permissions, and File Ownership
 - Checking User Accounts and Privileges
 
 - 3 Secure Installation and Configuration
 - 
               
               
                  
                  4
                      Implementing Oracle Linux Security
               
                  
               
               
               
- Configuring Access to Network Services
 - Configuring Packet-filtering Firewalls
 - Configuring OpenSSH
 - Configuring TCP Wrappers
 - Using chroot Jails to Protect the Root (/) Directory
 - Configuring and Using Software Management
 - Configuring and Using Data Encryption
 - Configuring and Using Certificate Management
 - Configuring and Using Authentication
 - Configuring and Using Pluggable Authentication Modules
 - Configuring and Using Access Control Lists
 - Configuring and Using SELinux
 - Configuring and Using Auditing
 - Configuring and Using System Logging
 - Configuring and Using Process Accounting
 - Configuring and Using Linux Containers
 - Configuring and Using Kernel Security Mechanisms
 
 - 
               
               
                  
                  5
                      Using OpenSCAP to Scan for Vulnerabilities
               
                  
               
               
               
- About SCAP
 - Installing the SCAP Packages
 - About the oscap Command
 - Displaying the Available SCAP Information
 - Displaying Information About a SCAP File
 - Displaying Available Profiles
 - Validating OVAL and XCCDF Files
 - Running a Scan Against a Profile
 - Generating a Full Security Guide
 - Running an OVAL Auditing Scan
 - Scanning Containers, Container Images and Offline File Systems
 
 - 6 FIPS 140-2 Compliance in Oracle Linux 7
 - 7 Oracle Linux 7 Common Criteria Certification
 - 8 Oracle Linux 7 KVM Common Criteria Certification