Table of Contents
- Title and Copyright Information
- Preface
- 1 Overview of Security Principles
- 2 Planning for a Secure Oracle Linux Environment
- 3 Managing System Security
-
4
Implementing Extra Security Features and Best Practices
- Working with Core Dumps
- Working with the Automatic Bug Reporting Tool
- Configuring and Using Kernel Security Mechanisms
- Restricting Access to Kernel Ring Buffer Messages
- Configuring System Cryptograpic Policies
- Checking User Accounts and Privileges
- Configuring User Authentication and Password Policies
- Configuring File System Mounts, File Permissions, and File Ownerships
- Restricting Access to SSH Connections
- Using System Auditing and Monitoring
- Using Advanced Intrusion Detection Environment
- Implementing System Process Accounting
- Protecting the Root Directory by Using chroot Jails
- 5 FIPS 140-2 Compliance in Oracle Linux 8
- 6 Oracle Linux 8 Common Criteria Certification
- 7 Security Considerations for Developers