In Chapter 13, Using CIS Benchmarks, we explored the CIS Benchmark for Red Hat Enterprise Linux 7 (version 2.2.0) and looked in detail at the document and implementation techniques. Although throughout this book we have focused on two of the more common operating systems found in the enterprise – Ubuntu Server LTS and RHEL/CentOS 7 – in the previous chapter, we chose to focus on the CIS Benchmark for RHEL 7 alone. This was purely for simplicity, as many of the good security practices that apply to RHEL 7 will also apply to Ubuntu Server LTS. For example, neither system should have root SSH logins enabled, and neither should have packet redirect sending enabled unless it is core to their role.
In this chapter, we will continue to develop our RHEL 7-based example. Please know that most of the techniques employed in this chapter for...