Tuesday, December 20, 2016

Controlling User Access I

Controlling User Access


A key aspect of both Linux workstation and Linux server security is to
implement and use user access controls to constrain what users can do
with the system. Earlier in this book, we discussed how to create and
manage users, groups, and permissions to do this. However, you can
take additional measures to increase the security of your systems. In
this part of the chapter, we’ll review the following:


• To root or not to root?
• Implementing a strong password policy
• Configuring user limits
Disabling user login
Auditing files









LX0-104 Exam Objectives (V and U, 323, 647 - 689)

No comments:

Post a Comment