Steps to Securing the Host
- Understand what you want to do: a security policy
- Understand how your system works: a system audit
- Remove unecessary features before you plug in
- Log everything and watch the logs
- Reaudit at intervals
Lincoln D. Stein, lstein@cshl.org
Cold Spring Harbor Laboratory
Last modified: Sun Jul 16 18:28:44 PDT 2000