hojqux9x2sZg

joined 1 year ago
[โ€“] hojqux9x2sZg@infosec.pub 1 points 11 months ago* (last edited 11 months ago)

Hardening depends on your threat model and needs of the client. Have the system do what it is supposed to do nothing more or less. I pretty much use this as a guide line depending on client needs.

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/pdf/security_guide/red_hat_enterprise_linux-7-security_guide-en-us.pdf

[โ€“] hojqux9x2sZg@infosec.pub 15 points 11 months ago

The low hanging fruit will already be scooped up. You have to get creative with emphasis on it being pronounceable first and brevity second. I feel the biggest mistake that gets made is waiting for the perfect name and overlooking a good one.