Red Hat Enterprise Linux 6 Security Guide

50668 Words Jan 19th, 2013 203 Pages
Red Hat Enterprise Linux 6 Security Guide

1

Red Hat Enterprise Linux 6
Security Guide
A Guide to Securing Red Hat Enterprise Linux

Edition 3

Red Hat Engineering Content Services

2

Legal Notice

Legal Notice
Copyright © 2011 Red Hat, Inc. Based on the Fedora Security Guide (current version at http://docs.fedoraproject.org/enUS/Fedora/16/html/Security_Guide/index.html), written by Johnray Fuller, Eric Christensen, Adam Ligas, and other Fedora Project contributors. T he text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In
…show more content…
xinetd 2.6.4. xinetd Configuration Files 2.6.5. Additional Resources 2.7. Virtual Private Networks (VPNs) 2.7.1. How Does a VPN Work? 2.7.2. Openswan 2.8. Firewalls 2.8.1. Netfilter and IPT ables 2.8.2. Basic Firewall Configuration 2.8.3. Using IPT ables 2.8.4. Common IPT ables Filtering 2.8.5. FORWARD and NAT Rules 2.8.6. Malicious Software and Spoofed IP Addresses 2.8.7. IPT ables and Connection T racking 2.8.8. IPv6 2.8.9. IPT ables 3. Encryption 3.1. Data at Rest 3.1.1. Full Disk Encryption 3.1.2. File Based Encryption 3.2. Data in Motion 3.2.1. Virtual Private Networks 3.2.2. Secure Shell 3.2.3. OpenSSL Intel AES-NI Engine 3.2.4. LUKS Disk Encryption 3.2.5. Using GNU Privacy Guard (GnuPG) 4. General Principles of Information Security 4.1. T ips, Guides, and T ools 5. Secure Installation 5.1. Disk Partitions 5.2. Utilize LUKS Partition Encryption 6. Software Maintenance 6.1. Install Minimal Software 6.2. Plan and Configure Security Updates 6.3. Adjusting Automatic Updates 6.4. Install Signed Packages from Well Known Repositories 7. Federal Standards and Regulations 7.1. Introduction 7.2. Federal Information Processing Standard (FIPS) 7.2.1. Enabling FIPS Mode 7.3. National Industrial Security Program Operating Manual (NISPOM) 7.4. Payment Card Industry Data Security Standard (PCI DSS) 7.5. Security T echnical Implementation Guide 8. References

6

Table of Contents

A. Encryption Standards A.1. Synchronous Encryption A.1.1. Advanced Encryption Standard - AES

More about Red Hat Enterprise Linux 6 Security Guide

Open Document