Chapter 4. Workstation Security

Securing a Linux environment begins with the workstation. Whether locking down your own personal machine or securing an enterprise system, sound security policy begins with the individual computer. After all, a computer network is only as secure as the weakest node.

4.1. Evaluating Workstation Security

When evaluating the security of a Red Hat Linux workstation, consider the following: