Chapter 6. Providing Security
In this chapter, we will cover the following topics:
- Locking down remote access and hardening SSH
- Installing and configuring fail2ban
- Working with a firewall
- Forging the firewall rules by example
- Generating self-signed certificates
- Using secure alternatives to FTP
Introduction
This chapter is a collection of recipes that provides a solid framework on which a server can be made secure in almost any environment. Security is the cornerstone of a good administrator, and this chapter illustrates how quickly and easily you can design and implement a series of checkpoints that will deliver the protection you need.
Get CentOS 7 Linux Server Cookbook - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.