Risk management is a continuous process of proactively discovering potential risk, assessing facts, and taking action based on the facts to resolve those risks.
Red Hat analyzes threats and vulnerabilities against all Red Hat products every day, and provides relevant advice and updates through the Red Hat Customer Portal.
Common Vulnerabilities and Exposures (CVE) records provide a standardized format for reporting and tracking security-related software issues.
Base your servers on a standard operating environment (SOE) that provides the minimum packages that all your systems need, and add only the packages that the server applications require.
Every daemon that provides a network service increases the risk of a successful remote attack. To reduce this risk, minimize the number of unnecessary services.
By default, Red Hat Enterprise Linux 9 disables SSH login for the root user.
When possible, turn off password-based SSH access and require key-based authentication for remote logins.
Red Hat recommends the DEFAULT cryptographic policy in most scenarios.
Click CREATE to build all of the virtual machines needed for the classroom lab environment. This may take several minutes to complete. Once created the environment can then be stopped and restarted to pause your experience.
If you DELETE your lab, you will remove all of the virtual machines in your classroom and lose all of your progress.