Q
Problem solve Get help with specific problems with your technologies, process and projects.

Hardening Linux as part of your client's network security policy

Even Linux is not immune to security threats, particularly in heterogeneous computing environments, and therefore securing your client's Linux servers and desktops should be an essential part of your client's network security policy. Learn how to use standard Linux security configuration, hardening and standards guidelines as the basis for Linux network security that works for customers using SuSE Linux Enterprise Server 10 or any other combination of Linux servers and desktops.

My customer is very new to the Linux environment, and I have to help them create a Linux network security policy, but I can't find any examples on the Web. Can you point me in the right direction? They are using SuSE Linux Enterprise Server 10.

Policies are usually high level and communicate the rules or expectations for everyone in the organization. They can take a long time to develop and an even longer time to get approved by management. This is why you usually want to limit the level of detail you include in a policy document.

Instead of creating written security policy for each and every operating system, platform and application used within the environment, the organization's security policy should require that specific standards and procedures documents be followed. This is where your Linux host standards or procedures would come in. In your standards and procedures documents, you can get as detailed as you want and have more flexibility to make adjustments as time goes on.

If you focus your Web search on Linux security configuration, hardening and standards guides, you will likely find what you are looking for.

Learn more about network security and open source security software at SearchSecurityChannel.com.

This was last published in August 2007

Dig Deeper on Managed network security services

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close