How Linux systems set up security management

Source: Internet
Author: User

Linux is a free broadcast class operating system, Linux system process under certain conditions can be any file, database and so on operation. If this process is used by lawless elements for other unlawful purposes, the system will be greatly compromised. As the majority of the server in the market share of the Linux system, this premise must ensure the security of the computer system, so we have to the process of security management. So how do you set up Linux system security management?

  The following steps are to set up system security management:

  1. Safety of the Boot program

The root password of the Linux system is easy to crack, if you do not set the bootstrapper password, such as Grub or LILO, in order to prevent the root password from being deciphered through the bootstrapper, it is highly recommended that you set the boot password for grub or LILO, and you can edit its configuration file/etc/ Grub.conf or/etc/lilo.conf, set the password parameter.

  2. Unsafe permission settings

Everyone common Linux file permissions are r W x, in fact, there is also a permission called S, if given a file to give the S permission, then this file in the execution will have the corresponding host user or host group user permissions, such as:

#chmod U+s testfile

#ls-la testfile

RWSR-----root root testfile

Thus, when the file is executed by another user, the user has the Execute permission on the testfile of this file host user root. Similarly, when a file's host group has the S permission, it is quite dangerous for the user who executes the file to have permissions on the file to the user of this file host group.

You can imagine, if the command chmod file is given the S permission, then other users what things can not do it? Then it can change the permissions of any file, of course, the S permission needs and X permissions combined use, without x permission of S is meaningless.

  3. Automatic logoff

When a user forgets to log out after using the server, it is also very dangerous, at this point, the administrator can set the/etc/profile file timeout parameters, when the user for a period of time do not do anything, the system automatically log off this user.

  4. Set Password complexity

In order to prevent the system user password is too simple to be deciphered, may edit the/etc/login.defs file, sets the system user password complexity, for instance the password longest, the shortest, the expiration time and so on.

  5. Prohibit unnecessary user login system

To prevent other non-system users from landing the system, it is possible to give the user a Non-existent home directory and a non-existent shell environment when adding users, and of course, it is best to change the access rights of the/etc/passwd and/etc/shadow two files so that the root user can access them.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.