Security is inversely proportional to complexity. By installing a minimally configured host and further hardening it, the complexity of a Web services host can reduced and the security increased. A step-wise approach of hardening the innermost ring of the system and proceeding outward like rings in a tree creates a secure platform.
In this 12-part tip Unix expert Gary Smith breaks down the process of building and maintaining a highly secure Web services architecture on the Solaris platform.
Table of contents:
Part 2: Install and configure a very basic operating system
Part 3: Force the use of su to gain root access
Part 4: Disable trusted host relationships and create a warning banner
Part 5: Configuring user accounts
Part 6: Disabling and removing unnecessary accounts
Part 7: Configure network access control
Part 8: Configure network services
Part 9: Install OpenSSH, disable NFS and reboot
Part 10: Set file permissions
Part 11: Test the configuration
Part 12: Conclusion
This was first published in October 2002