Bookmark this page

Summary

  • Risk management is a continuous process of proactively discovering potential risk, assessing facts, and taking action based on the facts to resolve those risks.

  • Red Hat analyzes threats and vulnerabilities against all Red Hat products every day, and provides relevant advice and updates through the Red Hat Customer Portal.

  • Common Vulnerabilities and Exposures (CVE) records provide a standardized format for reporting and tracking security-related software issues.

  • Base your servers on a standard operating environment (SOE) that provides the minimum packages that all your systems need, and add only the packages that the server applications require.

  • Every daemon that provides a network service increases the risk of a successful remote attack. To reduce this risk, minimize the number of unnecessary services.

  • By default, Red Hat Enterprise Linux 9 disables SSH login for the root user.

  • When possible, turn off password-based SSH access and require key-based authentication for remote logins.

  • Red Hat recommends the DEFAULT cryptographic policy in most scenarios.

Revision: rh415-9.2-a821299