<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LINUX Hardening guide differences in Secure OS Software for Linux</title>
    <link>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593583#M560</link>
    <description>I've always been a fan of the Centre for Internet Security benchmark tools. They are essecentially documents, that are consensus based that help to bring things in line. Large portions of the document also include pre-written scripts to help automate the task.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://cisecurity.org/en-us/?route=downloads" target="_blank"&gt;http://cisecurity.org/en-us/?route=downloads&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;They have benchmarks for pretty much any OS, as well, they have audit tools to test against later.&lt;BR /&gt;&lt;BR /&gt;Bastille is a great tool to start with, but is lacking in a number of areas. CIS also provides Bastille configs as a base, but enhances on them.&lt;BR /&gt;&lt;BR /&gt;Before wasting your time on an SELinux course, check out SANS (&lt;A href="http://www.sans.org)." target="_blank"&gt;www.sans.org).&lt;/A&gt; There is a UNIX specific course, which is primarily Linux based, as well as others. The Essentials bootcamp has a full day of UNIX/Linux as part of the 6-day program, which is an excellent program.&lt;BR /&gt;&lt;BR /&gt;Under the SANS reading room, there are a large number of whitepapers available for pretty much any topic. All papers in here are the work of successful "gold" certifications and double-blind graded by experts in the given field being written about.&lt;BR /&gt;&lt;BR /&gt;Something to remember about these documents is that they are not a "Bible". They are a series of guidelines that can lead to better security and hardening of a host. They change, they are not static, as a host that is secure today, is not secure tomorrow. Security is a journey, not a destination. No single reference is all encompassing.&lt;BR /&gt;&lt;BR /&gt;With that in mind, view the documents as a valid reference, consensus based ones are better than those written in a vacuum. What is most important is understanding the risk to your critical assets, and prioritise time, and resources to reduce those risks. If there is a risk you cannot reduce, understand the risk, and most of all, understand and put in place means by which you can DETECT that the risk has been compromised.&lt;BR /&gt;&lt;BR /&gt;Good luck and happy hunting,&lt;BR /&gt;Don</description>
    <pubDate>Wed, 03 Mar 2010 12:46:51 GMT</pubDate>
    <dc:creator>Don Mallory</dc:creator>
    <dc:date>2010-03-03T12:46:51Z</dc:date>
    <item>
      <title>LINUX Hardening guide differences</title>
      <link>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593580#M557</link>
      <description>What is the difference between the HP Common Criteria EAL4+ Evaluated Configuration Guide for Red Hat Enterprise Linux 5 on Hardware, date 05/31/2007; 2.3 and the NSA Guide to The Secure Configuration of Red Hat Enterprise Linux 5, date 12/20/2007; Revision 2?&lt;BR /&gt;&lt;BR /&gt;Is one of these more complete then the other?</description>
      <pubDate>Tue, 02 Mar 2010 21:38:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593580#M557</guid>
      <dc:creator>robert mead_1</dc:creator>
      <dc:date>2010-03-02T21:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: LINUX Hardening guide differences</title>
      <link>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593581#M558</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;The OS security vulnerabilities are different. HP ships in an insecure but secure able state.&lt;BR /&gt;&lt;BR /&gt;Linux ships in a lot more secure state, but it can be improved.&lt;BR /&gt;&lt;BR /&gt;Think about Bastille for both. &lt;BR /&gt;&lt;BR /&gt;It does a nice job.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 02 Mar 2010 21:56:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593581#M558</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2010-03-02T21:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: LINUX Hardening guide differences</title>
      <link>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593582#M559</link>
      <description>Based on the date of the Guides you are looking at it might be best to get into one of the RHEL Classes on SELINUX and Redhat secured over a book that is 4 years old.&lt;BR /&gt;&lt;BR /&gt;I'd be inclined to pickup the NSA guide as NSA wrote the guidelines for SE enhancements which redhat adopted.. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Mar 2010 22:15:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593582#M559</guid>
      <dc:creator>rmueller58</dc:creator>
      <dc:date>2010-03-02T22:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: LINUX Hardening guide differences</title>
      <link>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593583#M560</link>
      <description>I've always been a fan of the Centre for Internet Security benchmark tools. They are essecentially documents, that are consensus based that help to bring things in line. Large portions of the document also include pre-written scripts to help automate the task.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://cisecurity.org/en-us/?route=downloads" target="_blank"&gt;http://cisecurity.org/en-us/?route=downloads&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;They have benchmarks for pretty much any OS, as well, they have audit tools to test against later.&lt;BR /&gt;&lt;BR /&gt;Bastille is a great tool to start with, but is lacking in a number of areas. CIS also provides Bastille configs as a base, but enhances on them.&lt;BR /&gt;&lt;BR /&gt;Before wasting your time on an SELinux course, check out SANS (&lt;A href="http://www.sans.org)." target="_blank"&gt;www.sans.org).&lt;/A&gt; There is a UNIX specific course, which is primarily Linux based, as well as others. The Essentials bootcamp has a full day of UNIX/Linux as part of the 6-day program, which is an excellent program.&lt;BR /&gt;&lt;BR /&gt;Under the SANS reading room, there are a large number of whitepapers available for pretty much any topic. All papers in here are the work of successful "gold" certifications and double-blind graded by experts in the given field being written about.&lt;BR /&gt;&lt;BR /&gt;Something to remember about these documents is that they are not a "Bible". They are a series of guidelines that can lead to better security and hardening of a host. They change, they are not static, as a host that is secure today, is not secure tomorrow. Security is a journey, not a destination. No single reference is all encompassing.&lt;BR /&gt;&lt;BR /&gt;With that in mind, view the documents as a valid reference, consensus based ones are better than those written in a vacuum. What is most important is understanding the risk to your critical assets, and prioritise time, and resources to reduce those risks. If there is a risk you cannot reduce, understand the risk, and most of all, understand and put in place means by which you can DETECT that the risk has been compromised.&lt;BR /&gt;&lt;BR /&gt;Good luck and happy hunting,&lt;BR /&gt;Don</description>
      <pubDate>Wed, 03 Mar 2010 12:46:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/secure-os-software-for-linux/linux-hardening-guide-differences/m-p/4593583#M560</guid>
      <dc:creator>Don Mallory</dc:creator>
      <dc:date>2010-03-03T12:46:51Z</dc:date>
    </item>
  </channel>
</rss>

