Last week, the National Security Agency (NSA) released security guidance for securely configuring a Red Hat Enterprise Linux 5 machine.
Red Hat’s Security Standards team worked with the NSA on this effort and we are excited about it because it’s the most thorough and clear security guide to date for any Linux distribution. It should prove useful to admins and tool vendors looking for guidance on how to lock down any Linux system. As the guidance is specifically aimed at the options available with Red Hat Enterprise Linux 5 and the version of packages shipped with this operating system, it will be particularly useful for locking down Red Hat Enterprise Linux 5.
We are looking to continue to collaborate with governmental organizations and others to make the best practices for Red Hat Enterprise Linux security available.
About the author
More like this
From if to how: A year of post-quantum reality
End-to-end security for AI: Integrating AltaStata Storage with Red Hat OpenShift confidential containers
Data Security 101 | Compiler
AI Is Changing The Threat Landscape | Compiler
Browse by channel
Automation
The latest on IT automation that spans tech, teams, and environments
Artificial intelligence
Explore the platforms and partners building a faster path for AI
Cloud services
Get updates on our portfolio of managed cloud services
Security
Explore how we reduce risks across environments and technologies
Edge computing
Updates on the solutions that simplify infrastructure at the edge
Infrastructure
Stay up to date on the world’s leading enterprise Linux platform
Applications
The latest on our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech