Security Handbook

The Security handbook is Article description::a step-by-step guide for hardening Gentoo Linux.

Find the individual parts below or view the all-in-one-page Security handbook.

Contents

 * Pre-installation concerns
 * Why is security an important part for every server admin?


 * Bootloader security
 * Tightening security of the bootloader.


 * Logging
 * Choose between (at least) three different system loggers.


 * Mounting partitions
 * provides many security options.


 * User and group limitations
 * Control system resource usage.


 * File permissions
 * Securing local files.


 * PAM
 * Pluggable Authentication Modules.


 * TCP wrappers
 * Control access to services.


 * Kernel security
 * Instructions for securing the kernel.


 * Network security
 * Instructions for configuring network security options in the kernel.


 * Securing services
 * Help on ensuring system daemons are secure.


 * Chrooting and virtual servers
 * Isolating servers.


 * Firewalls
 * A guide on packet filtering.


 * Intrusion detection
 * How to discover if intruders have entered a system.


 * Staying up-to-date
 * Ensuring the latest security updates.