Pau Lo
asked on
linux audit
What are the key checks to perform when doing a security audit of a red hat linux server? And how do you check them, i.e users, user permissions, password polciies, audit policies, patches, share/export permissions etc. Please give some pointers on how to check the aforementioned areas. What are the common security mistakes/weak spots found on Linux systems?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.