Locking Linux

Wednesday, 29 January 2003, 5:34 PM EST

A well-hardened system not only thwarts outside intruders, it also protects against abuse perpetrated (intentionally or accidentally) by any user (whether authorized or unauthorized).

One subsystem that deserves special consideration is the file system. Hardening the file system safeguards the contents and attributes (protection bits, owner, etc.) of every file in the local file system. To secure the local file system, you have to conduct an audit and modify a variety of settings to provide only the minimum access required.

For example, look for inappropriate file and directory permissions, and correct any problems that you find. The most important of these are group- and/or world-writable system executables and directories, and commands that are setuid or setgid. For world-accessible files, change the permissions to be as restrictive as possible. For commands that are setuid or setgid, make sure the command and those permissions are really necessary, and ensure that no unauthorized ones get added.

[ Read more ]




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //