Chapter 17. Auditing UNIX and Linux

Solutions in this chapter:

▪ Patching and Software Installation
▪ Minimizing System Services
▪ Logging
▪ File System Access Control
▪ Additional Security Configuration
▪ Backups and Archives
▪ Auditing to Create a Secure Configuration
▪ Auditing to Maintain a Secure Configuration

Introduction

In this chapter we will introduce the concepts of auditing UNIX and Linux. One of the key secrets to auditing UNIX or Linux is to ensure that you have knowledgeable people available for the audit. The UNIX administrator will generally know the aspects of their system that they have configured. This will provide a wealth of information that was not necessarily readily available. (For the purposes of this chapter the term UNIX will ...

Get The IT Regulatory and Standards Compliance Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.