190 likes | 462 Views
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components. Learning Objective. Configure the basic settings to secure a Linux platform. Key Concepts. Secure boot loaders Security considerations while using kernel and user space components
E N D
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
Learning Objective • Configure the basic settings to secure a Linux platform.
Key Concepts • Secure boot loaders • Security considerations while using kernel and user space components • Discretionary access control (DAC) and access control lists (ACLs) • Mandatory access control (MAC) with Security Enhanced Linux (SELinux) • Concepts of a packet filtering firewall
Common Boot Loaders • Grand Unified Bootloader (GRUB) • Linux Loader (LILO) • Loadlin • Universal Bootloader (U-Boot)
The Linux Firewall Location of netfilter Location of iptables Kernel Space User Space Hardware User
Layered Security • Physical security • Firewall • Access control mechanisms • Encryption • Monitoring • Backups
Access Control Mechanisms DAC • Defines the access control for objects in the filesystem ACLs • Grants “special” permissions to users or groups for an object in the filesystem that are not specified in the DAC permissions MAC • Adds additional categories to objects in the filesystem
Kernel Space • Kernel Space has access and can control all aspects of a Linux system. • Loadable kernel modules (LKMs) are a common avenue for rootkits.
User Space • User space is the most likely avenue that black-hat hackers attempt to exploit the Linux system. • It is common for black-hat hackers to gain unauthorized access simply by guessing an easy password from a user account.
Importance of a Firewall Firewall on each host server provides an additional layer of security: • If the network perimeter firewall allows unauthorized traffic into the network, firewall protects servers from the unauthorized traffic. • Firewall provides additional protection to host servers if a rogue program infects the local area network (LAN).
Importance of Securing Core Components • Default settings, improper file permissions, and insecure user accounts are common methods used by black-hat hackers to gain unauthorized access. • Best practices and compliance standards require basic security and can result in hefty fines, if not followed.
Summary • In this presentation, the following concepts were covered: • Common boot loaders • The process of Linux access control • Access control mechanisms such as DAC, ACL, and MAC • Considerations for using kernel space and user space • Importance of firewall and securing core components