Summary
In this chapter, we covered topics that are important to a security-conscious Linux or Unix administrator. We began with a discussion of how to control access to your important scripts, and showed various methods of doing so. Next, we looked at considerations about the SUID and SGID permissions settings, and then we looked at a few different ways to prevent your scripts from leaking sensitive data. We then looked at how using the eval
command in scripts can be quite dangerous, and wrapped up with a discussion of path security.
In the next chapter, we’ll talk about debugging buggy scripts. I’ll see you there.