Ryan,

Take a look at Bastille Linux - it's great for hardening Redhat and others -
http://www.bastille-linux.org
There are also some very good papers on hardening Linux

http://www.enteract.com/~lspitz/linux.html
http://www.sans.org/infosecFAQ/linux/hardening.htm

As for the auditing ....

http://www.sans.org/infosecFAQ/audit/linux_sec.htm
http://www.sans.org/infosecFAQ/audit/audit_list.htm

but using AIDE/Tripwire for file integrity etc. would be the best bet.

TCP wrappers / Xinetd are great for allowing only certain hosts/networks to
connect to your boxen. As for ensuring that hosts are actually who they say
they are, that should be done on your border routers with ingress filtering.
While you're there, do a little egress filtering to. :)

http://www.ietf.org/rfc/rfc2827.txt
http://www.sans.org/infosecFAQ/firewall/egress.htm

That should be enuff to get you started.

Scott

Reply via email to