Summary
Once again, we’ve come to the conclusion of another chapter, and we covered a lot of cool topics. We started by looking at various ways to audit which services are running on your systems, and we saw some examples of what you probably don’t want to see. We then saw how to use the password-protection features of GRUB 2, and we saw the little quirks that we have to deal with when using those features. Next, we had a change of pace by looking at how to further lock down a system by properly setting up a system’s BIOS/UEFI. Finally, we looked at why we need to begin preparations to set up a hardened system by obtaining and following the proper checklist.
Not only does this conclude another chapter, but it also concludes this book. However, this doesn’t conclude your journey into the land of Mastering Linux Security and Hardening. Oh, no. As you continue this journey, you’ll find that there’s still more to learn, and still more that...