Henttunen, 2018 - Google Patents
Automated hardening and testing CentOS linux 7: security profiling with the USGCB baselineHenttunen, 2018
View PDF- Document ID
- 17806375592845405504
- Author
- Henttunen K
- Publication year
External Links
Snippet
Operating system hardening for a Linux operating system can be automated and needs to be performed in high security environments. Automated hardening is needed in virtual environments with lots of instances. Also, for identical system environments deployment …
- 238000009434 installation 0 abstract description 67
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Scarfone | Guide to security for full virtualization technologies | |
| Wong et al. | Threat modeling and security analysis of containers: A survey | |
| Chandramouli et al. | Security guidelines for storage infrastructure | |
| Giannakoulias | Cloud computing security: protecting cloud-based smart city applications | |
| Deshane | An attack-resistant and rapid recovery desktop system | |
| Creane et al. | Kubernetes Security and Observability | |
| Shimonski et al. | Security Strategies in Windows Platforms and Applications | |
| Mytilinakis | Attack methods and defenses on Kubernetes | |
| Henttunen | Automated hardening and testing CentOS linux 7: security profiling with the USGCB baseline | |
| Koskinen | Cloud Security Architecture | |
| Scarfone et al. | Sp 800-125. guide to security for full virtualization technologies | |
| Niemi | Engaging security into product development by using baseline security configuration for operating systems | |
| Mookhey et al. | Linux: Security, Audit and Control Features | |
| Beuchelt | UNIX and Linux security | |
| Dhavale | Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention | |
| Lipke | Building a secure software supply chain | |
| Kalsi | Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes | |
| Lipke | Building a secure software supply chain using docker | |
| Morfonios | Kubernetes cybersecurity | |
| Scarfone | Guide to general server security: Recommendations of the national institute of standards and technology | |
| Wiles | Canary: An Automated Approach to Security Scanning and Remediation | |
| Scarfone et al. | Sp 800-123. guide to general server security | |
| Paulenich et al. | Identification and triage of compromised virtual machines | |
| Grimes et al. | Windows Vista security: Securing Vista against malicious attacks | |
| Chasens | The Discovery, Disclosure, and Investigation of CVE-2024-25825 |