Chapter 9. Securing RHEL 7
In this chapter, you will learn all about:
- Installing and configuring IPA
- Securing the system login
- Configuring privilege escalation with sudo
- Securing the network with
firewalld
- Using kdump and SysRq
- Using ABRT
- Auditing the system
Introduction
Security is an important aspect of your environment. The recipes provided in this chapter are not a definitive set of how-tos; rather, they are a start to addressing security in an environment as every environment is different. This chapter is meant to give you an idea of what you can do with a simple set of tools included in Red Hat Enterprise Server 7.
In this chapter, I will not attempt explaining where the system stores syslog messages and what they mean as this can be quite an exhaustive topic. The most important security-related syslog messages can be found in /var/log/secure
and /var/log/audit/audit.log
.
Installing and configuring IPA
The IPA (Identity Policy Audit) server allows you to manage your kerberos, DNS...