Chapter 9. Securing RHEL 7

In this chapter, you will learn all about:

  • Installing and configuring IPA
  • Securing the system login
  • Configuring privilege escalation with sudo
  • Securing the network with firewalld
  • Using kdump and SysRq
  • Using ABRT
  • Auditing the system

Introduction

Security is an important aspect of your environment. The recipes provided in this chapter are not a definitive set of how-tos; rather, they are a start to addressing security in an environment as every environment is different. This chapter is meant to give you an idea of what you can do with a simple set of tools included in Red Hat Enterprise Server 7.

In this chapter, I will not attempt explaining where the system stores syslog messages and what they mean as this can be quite an exhaustive ...

Get Red Hat Enterprise Linux Server Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.