...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Anti-Virus Considerations
Anchor | ||||
---|---|---|---|---|
|
You may choose any proven anti-virus product. One option is ClamAV. Anchor
Applying Security Updates
CentOS (command line):
Install and use the yum-security plugin.
To install the plugin run:
...
borderColor | green |
---|---|
borderStyle | solid |
...
For UT devices running RHEL or CentOS installations, Cisco AMP - (only for UT systems) is another option. Please email help@ece.utexas.edu and provide the UT asset tag number (silver sticker The Property of The University of Texas at Austin) for further details. Your system will need to be verified it is property of the University.
Anchor | ||||
---|---|---|---|---|
|
Applying Security Updates
CentOS (command line):
Install and use the yum-security plugin.
To install the plugin run:
Panel | ||||
---|---|---|---|---|
| ||||
sudo yum install yum-security |
To list all updates that are security relevant, and get a reutrn code on whether there are security updates use:
...
# What ports, IPs and protocols we listen for
Port 491522002
It is recommended that a commonly known port number or a port number currently in use by another application is not selected. This may cause technical issues with port allocation in the future. A good secure range of ports you may want to use are ports from 49152 through 65535.
...
- Verify SSH is listening on the new port by connecting to it. Note how the port number now needs to be declared.
ssh username@hostname -p 491522002
Anchor | ||||
---|---|---|---|---|
|
Configure NTP Server
...
Source: https://wiki.ubuntu.com/LTS
Anchor | ||||
---|---|---|---|---|
|
Enable Firewall
Ubuntu: https://help.ubuntu.com/community/UFW
RHEL/CentOS: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-using_firewalls
Anchor | ||||
---|---|---|---|---|
|
Encryption: LUKS
Encryption is mandatory for all desktops and laptops with a Linux non-server operating system.
Refer to documentation at - https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-encryption
Note: It is preferred that encryption is enabled during the installation of the operating system. Initiating encryption after the system has been deployed will wipe all the user's data.
Anchor | ||||
---|---|---|---|---|
|
Implement Deny Hosts
...