Chapter 9. Securing RHEL 7

In this chapter, you will learn all about:

  • Installing and configuring IPA
  • Securing the system login
  • Configuring privilege escalation with sudo
  • Securing the network with firewalld
  • Using kdump and SysRq
  • Using ABRT
  • Auditing the system

Introduction

Security is an important aspect of your environment. The recipes provided in this chapter are not a definitive set of how-tos; rather, they are a start to addressing security in an environment as every environment is different. This chapter is meant to give you an idea of what you can do with a simple set of tools included in Red Hat Enterprise Server 7.

In this chapter, I will not attempt explaining where the system stores syslog messages and what they mean as this can be quite an exhaustive topic. The most important security-related syslog messages can be found in /var/log/secure and /var/log/audit/audit.log.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset