Re: Guidelines on Security Audit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Nessus, Google for it: 'nessus'.

Oh, did I mention nessus?

-Adam
(From Android)

On Oct 8, 2009 4:34 PM, <m.roth@xxxxxxxxx> wrote:

> Greetings. My employer has purchased a smaller company which has > two
servers running RHEL 5.1. ...
Several things: first, if the other company purchased it as a turnkey
solution, you should find out if they still have support; if so, support
should help you with this.

Second, there are a number of security scanners - I haven't done it in a
while, and don't remember which I used.

Finally, many if not most of the NIST's recommendations are based on
Bastille Linux. This is *not* a distro, but a set of hardening scripts
that will walk you through about 20 pages or so of questions, and then
shut down everything that doesn't need to be open, or running, and fix
permissions.

I've used that on my own firewall/router at home, and have been on
broadband for nine or ten years, and have not had a single intrusion, to
the best of my knowledge.

Hope this helps.

       mark

-- redhat-list mailing list unsubscribe mailto:
redhat-list-request@xxxxxxxxxx?subject=unsubscribe ...
-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux