4 Golden Rules of Linux Security

Logo
Presented by

Ben Montour & Rishi Kant , Uptycs Cloud Workload Specialists

About this talk

How to Make Linux More Secure (with less work) Let's have a candid conversation about getting back to basics. Linux’s power is its versatility. It can host hundreds of containers across a complex network or run a single desktop. It can power everything from smart TVs, Android phones and most Internet of Things (IoT) devices. But when it comes to locking down Linux, its adaptability can also be it’s Achilles’ heel. Here’s the truth: There are myriad solutions promising to help secure your Linux environment but none of them are worth a damn if you don’t have the basics down. We have a candid conversation about the importance of laying a firm foundation for an effective security program for your Linux environment and explore what we consider the 4 Golden Rules of Linux Security: - Reduce attack surface area with Secure Shell (SSH) best practices - Scan for odd user activity - Streamline routine Linux security tasks - Improve your threat detection Security professionals of all stripes will come away with actionable recommendations to prioritize and execute on these four foundational tenets and get their most pressing Linux security questions answered by an expert.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (37)
Subscribers (908)
Secure cloud, containers, and endpoints with one unified solution. Find and remove critical risks in your modern attack surface—from laptops to containers—all from a single UI and data model.