Start a Conversation

Unsolved

This post is more than 5 years old

514

May 1st, 2013 08:00

Security hardening of a Linux-based appliance

Addressing security requires know-how of almost every area, often not the case for typical developers. This article summarizes all areas that should not be ignored and how to avoid common mistakes.

In this award-winning Knowledge Sharing article, Aditya Lad and Anand Subramanian discuss the various points which must be considered while strengthening the security of a Linux system and how to go about it. Developing a proper hardening approach through security know-how and having a well-defined scope will help to avoid costly post-release vulnerabilities.

A collection of points learned over time, this article will be of interest to anyone—developers, security testers, or product managers—concerned about the security of a Linux-based product, wanting to learn about it, needing guidance or improvement around the current process, or to address product security features. The ideas behind the points presented are not specific to Linux operating systems as such and can be applied to any operating system however the technical implementation changes.

Read the article >>

No Responses!
No Events found!

Top