Conclusion Security is inversely proportional to complexity. By installing a minimally configured host and further...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
hardening it, the complexity of a Web services host can reduced and the security increased. A step-wise approach of hardening the innermost ring of the system and proceeding outward like rings in a tree creates a secure platform.
In this 12-part tip Unix expert Gary Smith breaks down the process of building and maintaining a highly secure Web services architecture on the Solaris platform.
Table of contents:
Part 1: Isolate the Web services host server
Part 2: Install and configure a very basic operating system
Part 3: Force the use of su to gain root access
Part 4: Disable trusted host relationships and create a warning banner
Part 5: Configuring user accounts
Part 6: Disabling and removing unnecessary accounts
Part 7: Configure network access control
Part 8: Configure network services
Part 9: Install OpenSSH, disable NFS and reboot
Part 10: Set file permissions
Part 11: Test the configuration
Part 12: Conclusion