This course is using an outdated version of the technology and is now considered to be Legacy content. It will be removed from our catalog on June 28, 2024. Please be sure to complete your course and finish any remaining labs before that date. We recommend moving to version 9.2, which is the latest version currently available.
Abstract
| Goal | Review tasks from Red Hat Security: Linux in Physical, Virtual, and Cloud |
| Objectives |
|
| Sections |
|
| Lab |
|
After completing this section, students should have reviewed and refreshed the knowledge and skills learned in Red Hat Security: Linux in Physical, Virtual, and Cloud.
Before beginning the comprehensive review for this course, students should be comfortable with the topics covered in each chapter.
Students can refer to earlier sections in the textbook for extra study.
Chapter 1, Managing Security and Risk
Define strategies to manage security on Red Hat Enterprise Linux servers.
Describe the fundamental concepts of security management for Red Hat Enterprise Linux servers, how to approach the security management process, and how Red Hat's development process and security response practices help.
Review simple recommended practices to improve the security of a server system.
Chapter 2, Automating Configuration and Remediation with Ansible
Remediate configuration and security issues automatically with Ansible Playbooks.
Describe the benefits of automation tools for managing security, install and configure an Ansible control node, and configure systems so that they can be managed by Ansible.
Read and interpret an existing Ansible Playbook, and run it in order to apply its plays to hosts as specified by the plays and the current Ansible inventory.
Run playbooks and manage access to authentication credentials using Red Hat Ansible Tower
Chapter 3, Protecting Data with LUKS and NBDE
Encrypt data on storage devices with LUKS, and use NBDE to manage automatic decryption when servers are booted.
Create encrypted storage devices with LUKS, and manually open and mount storage on LUKS-encrypted devices.
Manage decryption policy, and automatically decrypt storage when specified conditions are met, using NBDE.
Chapter 4, Restricting USB Device Access
Protect systems from rogue USB device access with USBGuard.
Configure and use USBGuard in order to selectively control USB device access.
Chapter 5, Controlling Authentication with PAM
Manage authentication, authorization, session settings, and password controls by configuring Pluggable Authentication Modules (PAM).
Explain how PAM works and interpret the effect of settings in existing PAM configuration files.
Configure authentication by updating the PAM files, and explain recommended practices for modifying and managing PAM configuration files.
Implement password quality requirements using pam_pwquality and authconfig.
Implement account locking after a specified number of failed logins.
Chapter 6, Recording System Events with Audit
Record and inspect system events relevant to security by using the Linux kernel's Audit subsystem and supporting tools.
Ensure Audit is installed and configured to record system events, and forward audit messages to a central audit server.
Search for events and generate reports from the audit log and interpret the results.
Write your own audit rules to configure the system to collect information about particular events.
Enable standard audit rule sets provided with Red Hat Enterprise Linux and identify potentially useful rule sets.
Chapter 7, Monitoring File System Changes
Detect and analyze changes to a server's file systems and their contents by using AIDE.
Detect and identify changes to files on a system that has AIDE installed, and manage AIDE checks and the AIDE detection database.
Investigate causes of file system changes reported by AIDE by using Linux Audit tools.
Chapter 8, Mitigating Risk with SELinux
Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analysis.
Configure SELinux in Enforcing mode on a server that has been running with SELinux disabled.
Limit user access to the system and the root account by configuring them as confined users.
Examine a system's SELinux policy to evaluate the access it permits, and to troubleshoot and resolve issues.
Chapter 9, Managing Compliance with OpenSCAP
Evaluate and remediate a server's compliance with security policies by using OpenSCAP.
Explain what OpenSCAP is and how it works, and install OpenSCAP tools and SCAP Security Guide content on a server.
Evaluate a server's compliance with the requirements specified by a policy from the SCAP Security Guide using OpenSCAP tools.
Create a tailoring file to adjust the policy's security checks so that they are relevant and correct for a specific system and its use case.
Run Ansible Playbooks, provided with the SCAP Security Guide's content, to remediate compliance checks that failed an OpenSCAP scan.
Chapter 10, Automating Compliance with Red Hat Satellite
Automate and scale your ability to perform OpenSCAP compliance checks and remediate compliance issues using Red Hat Satellite.
Configure an existing Red Hat Satellite to perform OpenSCAP scans of registered servers.
Perform OpenSCAP scans of registered systems from the Red Hat Satellite interface and evaluate the results of those scans.
Apply a tailoring file to a SCAP profile in Red Hat Satellite and use the customized SCAP policy to scan registered servers.
Chapter 11, Analyzing and Remediating Issues with Red Hat Insights
Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
Explain what Red Hat Insights is and how it complements OpenSCAP, and register a Red Hat Enterprise Linux server with Red Hat Insights.
Review and interpret issue reports provided by Red Hat Insights in your Red Hat Satellite web interface.
Remediate issues reported by Red Hat Insights using Red Hat Ansible Engine and Red Hat Ansible Tower integration with Red Hat Satellite.