Chapter 4. Workstation Security
Securing a Linux environment begins with the workstation. Whether locking
down a personal machine or securing an enterprise system, sound security
policy begins with the individual computer. After all, a computer network
is only as secure as its weakest node.
When evaluating the security of a Red Hat Enterprise Linux workstation, consider the
following:
BIOS and Boot Loader Security — Can an
unauthorized user physically access the machine and boot into single
user or rescue mode without a password?
Password Security — How secure are the user
account passwords on the machine?
Administrative Controls — Who has an account
on the system and how much administrative control do they have?
Available Network Services — What services are
listening for requests from the network and should they be running at
all?
Personal Firewalls — What type of firewall,
if any, is necessary?
Security Enhanced Communication Tools
— Which tools should be used to communicate between
workstations and which should be avoided?