Book Image

Hands-On Enterprise Automation on Linux

By : James Freeman
Book Image

Hands-On Enterprise Automation on Linux

By: James Freeman

Overview of this book

Automation is paramount if you want to run Linux in your enterprise effectively. It helps you minimize costs by reducing manual operations, ensuring compliance across data centers, and accelerating deployments for your cloud infrastructures. Complete with detailed explanations, practical examples, and self-assessment questions, this book will teach you how to manage your Linux estate and leverage Ansible to achieve effective levels of automation. You'll learn important concepts on standard operating environments that lend themselves to automation, and then build on this knowledge by applying Ansible to achieve standardization throughout your Linux environments. By the end of this Linux automation book, you'll be able to build, deploy, and manage an entire estate of Linux servers with higher reliability and lower overheads than ever before.
Table of Contents (23 chapters)
1
Section 1: Core Concepts
5
Section 2: Standardizing Your Linux Servers
10
Section 3: Day-to-Day Management
16
Section 4: Securing Your Linux Servers

Applying security policy wisely

As we had begun to explore in the previous section, each CIS Benchmark has a level and scoring associated with it. The level is of particular concern to us as, while we wish to secure our systems as effectively as possible, we would not wish to break any running systems. For this reason, it is highly advisable to apply the benchmarks in an isolated test environment and test your applications before deploying them to a production environment. Indeed, if the application of a benchmark breaks a given system, the following process should be executed in the enterprise to resolve it:

  1. Establish which benchmark caused the issue.
  2. Determine which internal systems were affected by the benchmark.
  3. Decide whether the internal systems can be changed to work with the benchmarks (for example, use an unprivileged account over SSH rather than root).
  4. Implement the...