Steps to Securing the Host

  1. Understand what you want to do: a security policy
  2. Understand how your system works: a system audit
  3. Remove unecessary features before you plug in
  4. Log everything and watch the logs
  5. Reaudit at intervals


<< Previous Contents >> Next >>

Lincoln D. Stein, lstein@cshl.org
Cold Spring Harbor Laboratory
Last modified: Sun Jul 16 18:28:44 PDT 2000