Chapter 6. Providing Security

In this chapter, we will cover the following topics:

  • Locking down remote access and hardening SSH
  • Installing and configuring fail2ban
  • Working with a firewall
  • Forging the firewall rules by example
  • Generating self-signed certificates
  • Using secure alternatives to FTP

Introduction

This chapter is a collection of recipes that provides a solid framework on which a server can be made secure in almost any environment. Security is the cornerstone of a good administrator, and this chapter illustrates how quickly and easily you can design and implement a series of checkpoints that will deliver the protection you need.

Get CentOS 7 Linux Server Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.