Appendix Summary

Security is inversely proportional to usability. There must be a balance between the requirements that your users have to get their work done and the amount of security that is implemented. It is often unnecessary to provide top security for a small business with only a few employees. On the other hand, if you work for a government military contractor, you are bound to have extreme security constraints and an official audit policy to determine whether your security policies are being implemented correctly.

Review your own security requirements periodically. Several of the tools mentioned in this appendix are designed to help you do this. Such tools as nessus, samhain, and SAINT all provide an auditing mechanism.

Some companies ...

Get A Practical Guide to Red Hat® Linux® 8 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.