Technical Blog Post
Abstract
Linux server hardening and security verification
Body
Technology heavily depends on the server infrastructure that lies behind the scenes of everyday services. It is imperative that security is ensured for these critical systems. System uptime and data integrity are constantly under fire from malicious entities.
System developers and administrators are responsible for securing these systems from attackers. Security audits on system configurations, utilization of tools to seek out and execute known exploits, and testing system applications before deployment can lead to found issues before the systems are available for attack from outsiders.
Read a detailed overview of hardening and verifying Linux systems in the IBM developerWorks article.
UID
ibm16170151