Securing Linux: A Survival Guide for Linux Security (Version 2.0)

1.1 SECURITY POLICIES

Security Policies are the blueprints used to build a security program. Your organization probably has a policy that states a system must be hardened before connecting it to the network. In this book, we will show you how to harden a Linux system, step by step, so that you can adhere to that policy. In very basic terms, Security Policies are the rules by which we secure environments. There are many types of security policies. These include:

Samples of these policies can be found at http://www.sans.org/newlook/resources/policies/policies.htm

Your company may already have many of these policies implemented. If you are involved in writing security policies, there are some guidelines you should remember.

Категории