Chapter 5: Linux Security Standards with Real-Life Examples
In this chapter, we'll explore the reasons why Linux hosts, like any hosts, need some care after initial installation – and in fact, throughout their life – to further secure them. Along the way, we'll cover various topics to build toward a final "big picture" of securing your Linux hosts.
The following topics will be covered in the chapter:
- Why do I need to secure my Linux hosts?
- Cloud-specific security considerations
- Commonly encountered industry-specific security standards
- The Center for Internet Security critical controls
- The Center for Internet Security benchmarks
- SELinux and AppArmor