Last week, the National Security Agency (NSA) released security guidance for securely configuring a Red Hat Enterprise Linux 5 machine.
Red Hat’s Security Standards team worked with the NSA on this effort and we are excited about it because it’s the most thorough and clear security guide to date for any Linux distribution. It should prove useful to admins and tool vendors looking for guidance on how to lock down any Linux system. As the guidance is specifically aimed at the options available with Red Hat Enterprise Linux 5 and the version of packages shipped with this operating system, it will be particularly useful for locking down Red Hat Enterprise Linux 5.
We are looking to continue to collaborate with governmental organizations and others to make the best practices for Red Hat Enterprise Linux security available.
About the author
More like this
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Developer resources
- Customer support
- Red Hat value calculator
- Red Hat Ecosystem Catalog
- Find a partner
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit