Select Page

Guidelines For Secure Linux Configuration

General Principles
1. All unnecessary network services must be disabled
2. Necessary services must be under strict access control (tcpwrappers)
3. All relevant security patches must be applied regularly
4. Remote access must be permitted only through ssh or other encryption software
5. No accounts must be maintained for anybody who is not or no longer affiliated with the department

Problems and suggestions: