Book Image

Hands-On Enterprise Automation on Linux

By : James Freeman
Book Image

Hands-On Enterprise Automation on Linux

By: James Freeman

Overview of this book

Automation is paramount if you want to run Linux in your enterprise effectively. It helps you minimize costs by reducing manual operations, ensuring compliance across data centers, and accelerating deployments for your cloud infrastructures. Complete with detailed explanations, practical examples, and self-assessment questions, this book will teach you how to manage your Linux estate and leverage Ansible to achieve effective levels of automation. You'll learn important concepts on standard operating environments that lend themselves to automation, and then build on this knowledge by applying Ansible to achieve standardization throughout your Linux environments. By the end of this Linux automation book, you'll be able to build, deploy, and manage an entire estate of Linux servers with higher reliability and lower overheads than ever before.
Table of Contents (23 chapters)
1
Section 1: Core Concepts
5
Section 2: Standardizing Your Linux Servers
10
Section 3: Day-to-Day Management
16
Section 4: Securing Your Linux Servers

Summary

In today's highly connected world, system security is paramount, and while Linux has long been regarded as a secure operating system, there is much that can be done to enhance its security. CIS Benchmarks provided one such standardized approach by bringing together a consensus on security best practices from across the technology industry. CIS Benchmarks, however, are extensive and, if applied by hand, would take many hours for an engineer to implement on a single system. Thus, automating their deployment is of vital importance.

In this chapter, you have learned about CIS Benchmarks, what they are for, and the benefits they bring. You then learned about the balance between security and application support, and how to make informed decisions when applying a server hardening policy. You also learned how to make use of shell scripts to apply some example security policies...