2006 Tech Tip: UNIX Configuration Guidelines
• White Paper
Describes commonly exploited UNIX system configuration problems and recommends practices that can be used to help deter several types of break-ins.
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This document describes commonly exploited UNIX system configuration problems and recommends practices that can be used to help deter several types of break-ins. We encourage system administrators to review all sections of this document and modify their systems to fix potential weaknesses.
We encourage you to consider taking the suggested steps to protect your system(s) from attack. We also encourage you to check with your vendor(s) regularly for any software updates or new software patches that relate to your systems.