[go: up one dir, main page]

Henttunen, 2018 - Google Patents

Automated hardening and testing CentOS linux 7: security profiling with the USGCB baseline

Henttunen, 2018

View PDF
Document ID
17806375592845405504
Author
Henttunen K
Publication year

External Links

Snippet

Operating system hardening for a Linux operating system can be automated and needs to be performed in high security environments. Automated hardening is needed in virtual environments with lots of instances. Also, for identical system environments deployment …
Continue reading at www.theseus.fi (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Scarfone Guide to security for full virtualization technologies
Wong et al. Threat modeling and security analysis of containers: A survey
Chandramouli et al. Security guidelines for storage infrastructure
Giannakoulias Cloud computing security: protecting cloud-based smart city applications
Deshane An attack-resistant and rapid recovery desktop system
Creane et al. Kubernetes Security and Observability
Shimonski et al. Security Strategies in Windows Platforms and Applications
Mytilinakis Attack methods and defenses on Kubernetes
Henttunen Automated hardening and testing CentOS linux 7: security profiling with the USGCB baseline
Koskinen Cloud Security Architecture
Scarfone et al. Sp 800-125. guide to security for full virtualization technologies
Niemi Engaging security into product development by using baseline security configuration for operating systems
Mookhey et al. Linux: Security, Audit and Control Features
Beuchelt UNIX and Linux security
Dhavale Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
Lipke Building a secure software supply chain
Kalsi Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes
Lipke Building a secure software supply chain using docker
Morfonios Kubernetes cybersecurity
Scarfone Guide to general server security: Recommendations of the national institute of standards and technology
Wiles Canary: An Automated Approach to Security Scanning and Remediation
Scarfone et al. Sp 800-123. guide to general server security
Paulenich et al. Identification and triage of compromised virtual machines
Grimes et al. Windows Vista security: Securing Vista against malicious attacks
Chasens The Discovery, Disclosure, and Investigation of CVE-2024-25825