Security is challenging, but it's essential, whether you're approaching security from a hygiene standpoint or because of regulatory compliance. Red Hat Enterprise Linux (RHEL) includes a host of security features. This article takes you on a short journey through some of the security features in RHEL.
Security Enhanced Linux
Security Enhanced Linux (SELinux) gets a bad rap. This mandatory access control layer in RHEL used to be difficult to configure and seemed to get in the way of everything. Those days have passed. SELinux is an integral part of RHEL, and the tooling around it has improved since the old days.
If you're running containers or virtual machines (VMs) on top of RHEL, you'll definitely want to have SELinux in enforcing mode. If you're running without SELinux, you should consider that SELinux has helped stop several vulnerabilities in their tracks. For example, SELinux thwarted CVE-2019-5736. Read more about it here.
If you're running a container or VM on RHEL, you probably already have SELinux enforcing, and you haven't even noticed. Containers and VMs require SELinux to provide the isolation they need.
[ Getting started with containers? Check out Deploying containerized applications: A technical overview. ]
SELinux has been enabled by default since RHEL 7 and provides access controls that separate processes, files, network devices, and users from each other. For containerized applications on RHEL, administrators can now use the udica utility to build SELinux policies for their applications. SELinux on RHEL 9 also includes performance improvements. From general code clean-up to deep optimizations in internal hash tables, you'll find SELinux's performance has improved.
System-wide crypto policies
Did you remember to disable TLSv1? How about SHA-1? You can make crypto policy changes system-wide with ease with a system-wide crypto policy tool. On most distributions, disabling a crypto algorithm requires changes in several places, both system and service levels. With the system-wide crypto policy tool, you can set a standard and apply it across the entire system.
A system-wide crypto policy tool will help you control what ciphers are used by OpenSSL, NSS, libgnutls, libgcrypt, and more, all with one command. The system-wide crypto policy is also used when implementing Federal Information Processing Standards (FIPS) crypto policies. And RHEL is one of the few Linux distributions that contains a tool like this.
You can learn more about system-wide crypto policies by getting your hands dirty in these online labs: Using system-wide cryptographic policy and Customizing the cryptographic policy.
Application allow-listing with fapolicyd
How about application allow-listing? Do you have a well-defined set of executables that should be allowed to run on your RHEL server? fapolicyd can help you lock in what's allowed to run and prevent anything that isn't. This configuration is perfect for systems that must exist in a hostile environment or under strict security requirements. fapolicyd uses digital signatures to determine if an application is unchanged and therefore allowed to run on the system. This is huge for preventing unknown code execution. One of the primary paths to compromise is pulling in a remote payload and executing it from a service account's home directory.
fapolicyd can help you prevent that exact scenario. Learn more about it in the Security hardening guide for Red Hat Enterprise Linux 9.
[ Want to test your sysadmin skills? Take a skills assessment today. ]
Network Bound Disk Encryption
Encryption at rest is a tricky problem. If you encrypt your disk, then to boot your system, you'll need to store the encryption key somewhere the system can reach. Many available solutions require the key and the encrypted volume to be stored on the same system. That's not ideal. You can move that encryption key off the system with Network Bound Disk Encryption (NBDE).
NBDE utilizes a system on your network external to your encrypted data. When a system boots or needs to unlock an encrypted volume, it checks in with the key server and unlocks the volume only if the key exchange is successful. If a disk is physically removed from your datacenter, it can no longer be unlocked without a password.
NBDE works great for mobile workstations. Imagine if your laptop could unlock automatically when you're within your corporate network, but it would require a password if it were lost or stolen.
Use the following links to learn more about Network Bound Disk Encryption:
- Red Hat Enterprise Linux Presents Episode 36
- Using RHEL System Roles to automate and manage Network Bound Disk Encryption
Built-in security compliance remediation
Security compliance can be tedious, but OpenSCAP has your back. Either at install time or on an existing deployment, OpenSCAP can be used to scan and remediate your systems to get them closer to compliant. Red Hat Satellite and Red Hat Insights also use OpenSCAP to detect and remediate compliance issues. You can even have OpenSCAP generate easy-to-read reports that inform security compliance audits or general good security hygiene. OpenSCAP includes definitions for PCI-DSS, STIG, CIS, and more.
Wrap up
I hope you've learned something about RHEL's security features. RHEL is backed by Red Hat's independent security validation through common criteria certification and FIPS. See the US Government Certifications Red Hat knowledgebase article for more info. If you'd like to try out security or other technologies in RHEL, please head to the online labs.
[ Keep your most commonly used commands handy with the Linux commands cheat sheet. ]
저자 소개
Nate is a Technical Account Manager with Red Hat and an experienced sysadmin with 20 years in the industry. He first encountered Linux (Red Hat 5.0) as a teenager, after deciding that software licensing was too expensive for a kid with no income, in the late 90’s. Since then he’s run everything from BBS’s (remember those?) to derby hat’s containing raspberry pi’s, to Linux systems in his basement, or in enterprise-class data-centers.
He runs his own blog at undrground.org, hosts the Iron Sysadmin Podcast, and when he’s not at a command line, he’s probably in the garage tinkering on his Jeep, or out on the trails.
유사한 검색 결과
Deploy Confidential Computing on AWS Nitro Enclaves with Red Hat Enterprise Linux
Red Hat OpenShift sandboxed containers 1.11 and Red Hat build of Trustee 1.0 accelerate confidential computing across the hybrid cloud
What Is Product Security? | Compiler
Technically Speaking | Security for the AI supply chain
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래