Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Linux DevOps Handbook

You're reading from   The Linux DevOps Handbook Customize and scale your Linux distributions to accelerate your DevOps workflow

Arrow left icon
Product type Paperback
Published in Nov 2023
Publisher Packt
ISBN-13 9781803245669
Length 428 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Authors (2):
Arrow left icon
Damian Wojsław Damian Wojsław
Author Profile Icon Damian Wojsław
Damian Wojsław
Grzegorz Adamowicz Grzegorz Adamowicz
Author Profile Icon Grzegorz Adamowicz
Grzegorz Adamowicz
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Part 1: Linux Basics
2. Chapter 1: Choosing the Right Linux Distribution FREE CHAPTER 3. Chapter 2: Command-Line Basics 4. Chapter 3: Intermediate Linux 5. Chapter 4: Automating with Shell Scripts 6. Part 2: Your Day-to-Day DevOps Tools
7. Chapter 5: Managing Services in Linux 8. Chapter 6: Networking in Linux 9. Chapter 7: Git, Your Doorway to DevOps 10. Chapter 8: Docker Basics 11. Chapter 9: A Deep Dive into Docker 12. Part 3: DevOps Cloud Toolkit
13. Chapter 10: Monitoring, Tracing, and Distributed Logging 14. Chapter 11: Using Ansible for Configuration as Code 15. Chapter 12: Leveraging Infrastructure as Code 16. Chapter 13: CI/CD with Terraform, GitHub, and Atlantis 17. Chapter 14: Avoiding Pitfalls in DevOps 18. Index 19. Other Books You May Enjoy

Know your rights

The most basic security mechanism in Linux is based on defining a combination of rights for a set of entities. The rights are as follows:

  • read
  • write
  • execute (read contents when talking about a directory)

And the entities are as follows:

  • The owner of the file or directory
  • The group that owns the file or directory
  • All the other users and groups

This is a crude security system. It’s sufficient for small servers and desktop uses but, for more complex setups, it is sometimes too restraining. There are other additional systems, such as Access Control Lists (ACLs), AppArmor, SELinux, and more. We are not going to cover them in this book.

With the use of the previous systems, we can still achieve quite a lot regarding our system security.

How do those rights and ownership work? We use the ls command (list files and directories):

admin@myhome:/$ ls -ahl
total 36K
drwxr-xr-x 3 admin admin 4.0K Aug 20 20:21 .
drwxr...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime