Useful Websites
- https://access.redhat.com/kb/docs/DOC-6039
-
The CentOS Knowledgebase article about the
kexec
andkdump
configuration.
- http://people.redhat.com/anderson/
-
The crash utility homepage.
Part VII. Security And Authentication
Whether system administrators need to secure their mission-critical systems, services, or data, Community Enterprise Linux provides a range of tools and methods to serve as part of a comprehensive security strategy.
This chapter provides a general introduction to security, and from the perspective of Community Enterprise Linux in particular. It provides conceptual information in the areas of security assessment, common exploits, and intrusion and incident response. It also provides conceptual and specific configuration information on how to use SELinux to harden Workstation, Server, VPN, firewall and other implementations.
This chapter assumes a basic knowledge of IT security, and consequently provides only minimal coverage of common security practices such as controlling physical access, sound account-keeping policies and procedures, auditing, etc. Where appropriate, reference is made to external resources for this and related information.
Table of Contents
- Security Overview
- Securing Your Network
- Security and SELinux
- Working With SELinux
-
- End User Control of SELinux
- Administrator Control of SELinux
-
- Viewing the Status of SELinux
- Relabeling a File System
- Managing NFS Home Directories
- Granting Access to a Directory or a Tree
- Backing Up and Restoring the System
- Enabling or Disabling Enforcement
- Enable or Disable SELinux
- Changing the Policy
- Specifying the Security Context of Entire File Systems
- Changing the Security Category of a File or User
- Running a Command in a Specific Security Context
- Useful Commands for Scripts
- Changing to a Different Role
- When to Reboot
- Relabeling a File System
- Viewing the Status of SELinux
- Analyst Control of SELinux
- Customizing SELinux Policy
- References