Whether system administrators need to secure their
mission-critical systems, services, or data, Red Hat
Enterprise Linux provides a range of tools and methods to
serve as part of a comprehensive security strategy.
This chapter provides a general introduction to security, and from the perspective of Red Hat Enterprise Linux in particular. It provides conceptual information in the areas of security assessment, common exploits, and intrusion and incident response. It also provides conceptual and specific configuration information on how to use SELinux to harden Workstation, Server, VPN, firewall and other implementations.
This chapter assumes a basic knowledge of IT security, and
consequently provides only minimal coverage of common security
practices such as controlling physical access, sound
account-keeping policies and procedures, auditing, etc. Where
appropriate, reference is made to external resources for this
and related information.