Establishing a Security Framework

Establishing a Security Framework

The first step in securing your Linux system is to set up a security policy. The security policy is your guide to what you enable users (as well as visitors over the Internet) to do on the Linux system. The level of security you establish depends on how you use the Linux system and how much is at risk if someone gains unauthorized access to your system.

If you are a system administrator for Linux systems at an organization, you probably want to involve the management, as well as the users, in setting up the security policy. Obviously, you cannot create an imposing policy that prevents everyone from working on the system. On the other hand, if the users are creating or using data valuable to the organization, you have to set up a policy that protects the data from disclosure to outsiders. In other words, the security policy should strike a balance between the users' needs and the need to protect the system.

For a standalone Linux system or a home system you occasionally connect to the Internet, the security policy can be just a listing of the Internet services you want to run on the system and the user accounts you plan to set up on the system.

Determining Business Requirements for Security

The security framework outlined in starts with the development of a security policy based on business requirements and risk analysis. The business requirements identify the security needs of the business-the computer resources and information you have to protect (including any requirements imposed by applicable laws, such as the requirement to protect the privacy of some types of data). Typical security requirements might include items such as the following:

  • Enable access to information by authorized users.

  • Implement business rules that specify who has access to what information.

  • Employ a strong user-authentication system.

  • Deny malicious or destructive actions on data.

  • Protect data from end to end as it moves across networks.

  • Implement all security and privacy requirements that applicable laws impose.

Performing Risk Analysis

Risk analysis involves determining the following and performing some analysis to establish the priority of handling the risks:

Before I describe risk analysis, here are some typical threats to computer security:

These threats come from exploitation of vulnerabilities in your organization's computer and human resources. Some common vulnerabilities are the following:

Establishing a Security Policy

Based on the risk analysis and any business requirements you may need to address regardless of risk level, you can craft a security policy for the organization. The security policy typically addresses the following areas:

Implementing Security Solutions

After you analyze the risks-vulnerabilities-and develop a security policy, you have to select the mitigation approach: how to protect against specific vulnerabilities. This is where you develop an overall security solution based on security policy, business requirements, and available technology-a solution that consists of the following:

Managing Security Continuously

In addition to implementing security solutions, you have to set up security management that continually monitors, detects, and responds to any security incidents.

The combination of the risk analysis, security policy, security solutions, and security management provides the overall security framework. Such a framework helps establish a common level of understanding of security and a common basis for the design and implementation of security solutions.

The remainder of this chapter shows you some of the ways in which you can enhance and maintain the security of your CentOS Linux system and any network.