The Unix Auditor's Practical Handbook

Thursday, 14 November 2002, 5:07 PM EST

This is a step-by-step practical guide to auditors when carrying out a Unix Audit. It mostly covers Sun Solaris systems, but it has cross-references for AIX and Linux.

It covers the following areas of an Audit:

1. Preliminary Steps
2. Documentation
3. Physical Security
4. Operating System Security
5. Network Security
6. Filesystem Security
7. User and Group Security
8. Sun Built-in Auditing
9. Backup and Emergency Response
10. Automated Auditing Tools
11. References

We have kept the focus on the practicality of conducting an audit, providing the reader with the commands, filenames, tools, and techniques for carrying out the audit.

It is also useful for security administrators, who might be looking to implement security on their Unix Servers.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //