How do I secure and audit shell access with Enterprise Audit Shell?

by on May 25, 2006· LAST UPDATED May 25, 2006

in

Most of us know how to secure a UNIX/Linux server. In this article Douglas Hanks, talks about securing and auditing the shell access with Enterprise Audit Shell (EAS).

FTA "...Sarbanes-Oxley has forced many companies to start taking UNIX security seriously. Not a big deal. We all know how to secure a UNIX server: disable unnecessary network daemons; remove unnecessary software packages like compilers and debuggers; institute strict password and account parameters; and search and destroy world-writable files. The only thing that eludes us is how to secure and audit shell access. This is where Enterprise Audit Shell (EAS) comes in...",

Read more

TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

Comments on this FAQ are closed. If you'd like to continue the discussion on this topic, you can do so at our forum.

Previous post:

Next post: