Book Image

Practical Linux Security Cookbook

By : Michael A Lindner, Tajinder Kalsi
Book Image

Practical Linux Security Cookbook

By: Michael A Lindner, Tajinder Kalsi

Overview of this book

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security. With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
Table of Contents (17 chapters)
Practical Linux Security Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Configuring password protection


In any system, the password plays a very important role in terms of security. A poor password may lead to an organization's resources being compromised. The password protection policy should be adhered to by everyone in the organization, from users to the administrator level.

How to do it…

Follow the given rules when selecting or securing your password.

For the creation policy, follow these rules:

  • A user should not use the same password for all the accounts in an organization

  • All access-related passwords should not be the same

  • Any system-level account should have a password that's different from any other account held by the same user

For the protection policy, follow these rules:

  • A password is something that needs to be treated as sensitive and confidential information. Hence, it should not be shared with anyone.

  • Passwords should not be shared through any electronic communication, such as e-mails.

  • Never reveal a password on your phone or questionnaire.

  • Do not use password hints that could provide clues to an attacker.

  • Never share company passwords with anyone, including administrative staff, managers, colleagues, and even family members.

  • Don't store passwords in written form anywhere in your office. If you store passwords on a mobile device, always use encryption.

  • Don't use the Remember Password feature of applications.

  • In there's any doubt of a password being compromised, report the incident and change the password as soon as possible.

For the change policy, follow these rules:

  • All users and administrators must change their password on a regular basis or at least on a quarterly basis

  • The security audit team of an organization must conduct random checks to check whether the passwords of any user can be guessed or cracked

How it works…

With the help of the preceding points, ensure that a password, when created or changed, is not easy enough to be guessed or cracked.