IBM Support

Linux server hardening and security verification

Technical Blog Post


Abstract

Linux server hardening and security verification

Body

Technology heavily depends on the server infrastructure that lies behind the scenes of everyday services. It is imperative that security is ensured for these critical systems. System uptime and data integrity are constantly under fire from malicious entities. 

 

System developers and administrators are responsible for securing these systems from attackers. Security audits on system configurations, utilization of tools to seek out and execute known exploits, and testing system applications before deployment can lead to found issues before the systems are available for attack from outsiders.

 

Read a detailed overview of hardening and verifying Linux systems in the IBM developerWorks article.

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"HW1W1","label":"Power ->PowerLinux"},"Component":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"","Edition":"","Line of Business":{"code":"","label":""}}]

UID

ibm16170151