Table of Contents
- Title and Copyright Information
- Preface
- 1 Overview of Security Principles
- 2 Planning for a Secure Oracle Linux Environment
- 3 Managing System Security
-
4
Implementing Extra Security Features and Best Practices
- Working with Core Dumps
- Configuring and Using Kernel Security Mechanisms
- Configuring System Cryptograpic Policies
- Checking User Accounts and Privileges
- Configuring User Authentication and Password Policies
- Configuring File System Mounts, File Permissions, and File Ownerships
- Restricting Access to SSH Connections
- Using System Auditing and Monitoring
- Using Advanced Intrusion Detection Environment
- Implementing System Process Accounting
- Protecting the Root Directory by Using chroot Jails
- 5 FIPS 140-3 Compliance in Oracle Linux 9
- 6 Security Considerations for Developers