官术网_书友最值得收藏!

Chapter 1. Operating System and Baseline Security

Server or network security doesn't start from a configuration or implementation level. In order to achieve the maximum result, it has to start from a policy or framework level. Also, your security and hardening policy must apply to all your end-to-end devices and services for it to effectively secure your IT infrastructure. The network or server components can be a part of this policy. Since the emphasis of this book is more towards the server security aspect, I will focus more on server security configuration instead of a broad security. Physical security is more important than any other security. For the purpose of this book, my assumption is that a policy, framework, and physical security are already in place. So our security conversation starts from a server level.

In this chapter, my plan is to walk you through a security tool, Security Configuration Wizard (SCW), and it's configuration details, and explain how you can use this tools in your environment to make the existing or new server infrastructure more secure. This tool will provide you with a common platform to create a policy template and apply these polices in an automated fashion, regardless of how they are defined and where they are coming from.

主站蜘蛛池模板: 德阳市| 离岛区| 浦县| 洱源县| 绥芬河市| 改则县| 方山县| 乐昌市| 澄城县| 垫江县| 保亭| 都昌县| 平江县| 慈利县| 揭阳市| 博爱县| 林芝县| 沙坪坝区| 宣威市| 龙里县| 郯城县| 长丰县| 大兴区| 沙坪坝区| 余干县| 阿合奇县| 麻城市| 日喀则市| 建德市| 留坝县| 武宁县| 罗江县| 邮箱| 阜康市| 铁力市| 沅江市| 东乡族自治县| 桑植县| 洛隆县| 津南区| 张家口市|