Subscribe to our blog

Last week, the National Security Agency (NSA) released security guidance for securely configuring a Red Hat Enterprise Linux 5 machine.

Red Hat’s Security Standards team worked with the NSA on this effort and we are excited about it because it’s the most thorough and clear security guide to date for any Linux distribution. It should prove useful to admins and tool vendors looking for guidance on how to lock down any Linux system. As the guidance is specifically aimed at the options available with Red Hat Enterprise Linux 5 and the version of packages shipped with this operating system, it will be particularly useful for locking down Red Hat Enterprise Linux 5.

We are looking to continue to collaborate with governmental organizations and others to make the best practices for Red Hat Enterprise Linux security available.


About the author

Browse by channel

automation icon

Automation

The latest on IT automation for tech, teams, and environments

AI icon

Artificial intelligence

Updates on the platforms that free customers to run AI workloads anywhere

open hybrid cloud icon

Open hybrid cloud

Explore how we build a more flexible future with hybrid cloud

security icon

Security

The latest on how we reduce risks across environments and technologies

edge icon

Edge computing

Updates on the platforms that simplify operations at the edge

Infrastructure icon

Infrastructure

The latest on the world’s leading enterprise Linux platform

application development icon

Applications

Inside our solutions to the toughest application challenges

Original series icon

Original shows

Entertaining stories from the makers and leaders in enterprise tech