2006 Tech Tip: UNIX Configuration Guidelines

White Paper
By
Describes commonly exploited UNIX system configuration problems and recommends practices that can be used to help deter several types of break-ins.
Publisher

Software Engineering Institute

Abstract

This document describes commonly exploited UNIX system configuration problems and recommends practices that can be used to help deter several types of break-ins. We encourage system administrators to review all sections of this document and modify their systems to fix potential weaknesses.

We encourage you to consider taking the suggested steps to protect your system(s) from attack. We also encourage you to check with your vendor(s) regularly for any software updates or new software patches that relate to your systems.