brombulec wrote: » And pay attention to IPA config and PAM config. It's a little bit tricky - just do the IPA tasks before PAM. This exam is very interesting but if you can do and understand all the tasks in comprehensive review from official course book you're good to go.
JockVSJock wrote: » Also check out Bastille Linux.BASTILLE-LINUX
Verities wrote: » Interesting...first I've heard of this Bastille-Linux. Have you used it before Jock? If so, what do you like/dislike about it?
JockVSJock wrote: » I remember this as I was driving in to work this morning. SANS has a number of Linux/UNIX hardening classes which would be another way to gain more knowledge on this subject:https://www.sans.org/course/securing-linux-unix
varelg wrote: » brombulec, isn't Oracle Linux simply rebranded RHEL?
Xavor wrote: » When I first got into IT we did STIGS on the Windows boxes, and I went through each item by hand. I learned a lot about the underpinnings of Windows and what gets reported back to Microsoft (boatloads). I have earmarked a goal to do puppet scripts to apply the RHEL STIGS, but I don't really have the time atm. Looking at the requirements, it doesn't look like SElinux is heavily involved? What about aide? I've used some locked down systems which had a lot of these controls configured. I assume the filesystem topic gets into facl and fine grained access controls? Where have you seen systems that heavily configured?
asummers wrote: » I think the main purpose would be to know what to harden, and how to do it. Automated tools would add a layer of abstraction where you don't know how to harden - you know how to run a program. The RH413 course and exam would be geared towards hardening the main areas - it won't cover everything - and of course STIGs are very useful to learning how things hang together.