Security Flashcards
Update software/ apps regularly
Application
Use separate partitions for users files and system files
File system
Manage bash history
file system
Update /etc/sysctl.conf with secure configurations when possible
kernel
Implement a centralized authentication service like kerberos
network
Use encryption for data transfer
network
Disable booting from external drives
kernel
Implement intrusion detection with AIDE (advanced intrusion detection environment
file system
Disable root login
authentication
Implement ssh key pairs
authentication
Container Encryption
data
Cryptograph and key management
cloud data
Privileged identity management PIM
IAM Cloud
Standard applications
Microservices
app cloud
Hypervisors
compute cloud
Virtual Switches
Virtual Firewalls
network cloud
MFA
Authorization
IAM Cloud