|Newer page:||version 5||Last edited on Wednesday, August 4, 2004 4:05:47 pm||by MichaelBordignon|
|Older page:||version 4||Last edited on Wednesday, September 10, 2003 8:20:08 pm||by CraigBox||Revert|
@@ -1,8 +1,8 @@
An overview of the steps required to secure a unix machine
!!!Keep up to date on security issues
announcements on security issues, read lists like bugtraq. __Apply__ the patches when they are announced!
+Read your announcements on security issues, read lists like bugtraq. __Apply__ the patches when they are announced!
!!!Remove any unnecessary services
you should use netstat -ap and remove any services you are not using, preferably remove them from the machine entirely, but at least prevent them from running. Of any services that you must run, make sure they are firewalled as much as possible, and that tcpwrappers(5) are used to protect against them. If you are really paranoid you should remove them, firewall them, __and__ tcpwrap them. Consider firewalling outgoing connections too, making it difficult for an attacker to install further software.