Book Image

Mastering Ubuntu Server - Second Edition

By : Jay LaCroix
Book Image

Mastering Ubuntu Server - Second Edition

By: Jay LaCroix

Overview of this book

Ubuntu Server has taken the data centers by storm. Whether you're deploying Ubuntu for a large-scale project or for a small office, it is a stable, customizable, and powerful Linux distribution that leads the way with innovative and cutting-edge features. For both simple and complex server deployments, Ubuntu's flexible nature can be easily adapted to meet to the needs of your organization. With this book as your guide, you will learn all about Ubuntu Server, from initial deployment to creating production-ready resources for your network. The book begins with the concept of user management, group management, and filesystem permissions. Continuing into managing storage volumes, you will learn how to format storage devices, utilize logical volume management, and monitor disk usage. Later, you will learn how to virtualize hosts and applications, which will cover setting up KVM/QEMU, as well as containerization with both Docker and LXD. As the book continues, you will learn how to automate configuration with Ansible, as well as take a look at writing scripts. Lastly, you will explore best practices and troubleshooting techniques when working with Ubuntu Server that are applicable to real-world scenarios. By the end of the book, you will be an expert Ubuntu Server administrator who is well-versed in its advanced concepts.
Table of Contents (21 chapters)

Chapter 15 – Securing Your Server

  1. This stands for Common Vulnerabilities and Exposures, and is a database containing lists of known exploits and vulnerabilities for a given platform, along with scope of the issue and mitigation steps (if known)
  2. Livepatch
  3. jail.conf, jail.local
  4. Disable password authentication, disable root login, place it behind a firewall, change the default port, set up an allowed users or groups list
  5. The principle of least privilege refers to giving users only the permissions to resources they absolutely need for their job, thus limiting the scope if they make a mistake

  1. netstat -tulpn
  2. cryptsetup
  3. Custom graphs, hardware information, reports, or any other feature not mentioned