Better state the intended audience
This commit is contained in:
parent
d2a9893951
commit
9bd419e531
|
@ -1,10 +1,14 @@
|
||||||
# Linux workstation security checklist
|
# Linux workstation security checklist
|
||||||
|
|
||||||
This is a set of recommendations used by the Linux Foundation for their systems
|
### Target audience
|
||||||
administrators. All of LF employees are remote workers and we use this set of
|
|
||||||
guidelines to ensure that a sysadmin's system passes core security requirements
|
This document is aimed at systems administrators who use a Linux desktop as
|
||||||
in order to reduce the risk of it becoming an attack vector against the rest
|
their main workstation.
|
||||||
of our infrastructure.
|
|
||||||
|
If your systems adminstrators are remote workers, you may use this
|
||||||
|
set of guidelines to help ensure that their workstations pass core security
|
||||||
|
requirements in order to reduce the risk that they become attack vectors
|
||||||
|
against the rest of your IT infrastructure.
|
||||||
|
|
||||||
Even if your systems administrators are not remote workers, chances are that
|
Even if your systems administrators are not remote workers, chances are that
|
||||||
they perform a lot of their work either from a portable laptop in a work
|
they perform a lot of their work either from a portable laptop in a work
|
||||||
|
@ -12,6 +16,8 @@ environment, or set up their home systems to access the work infrastructure
|
||||||
for after-hours/emergency support. In either case, you can adapt this set of
|
for after-hours/emergency support. In either case, you can adapt this set of
|
||||||
recommendations to suit your environment.
|
recommendations to suit your environment.
|
||||||
|
|
||||||
|
### Limitations
|
||||||
|
|
||||||
This, by no means, is an exhaustive "workstation hardening" document, but
|
This, by no means, is an exhaustive "workstation hardening" document, but
|
||||||
rather an attempt at a set of baseline recommendations to avoid most glaring
|
rather an attempt at a set of baseline recommendations to avoid most glaring
|
||||||
security errors without introducing too much inconvenience. You may read this
|
security errors without introducing too much inconvenience. You may read this
|
||||||
|
@ -22,12 +28,14 @@ is a crazy person. These guidelines are merely a basic set of core safety
|
||||||
rules that is neither exhaustive, nor a replacement for experience, vigilance,
|
rules that is neither exhaustive, nor a replacement for experience, vigilance,
|
||||||
and common sense.
|
and common sense.
|
||||||
|
|
||||||
|
### Structure
|
||||||
|
|
||||||
Each section is split into two areas:
|
Each section is split into two areas:
|
||||||
|
|
||||||
- The checklist that can be adapted to your project's needs
|
- The checklist that can be adapted to your project's needs
|
||||||
- Free-form list of considerations that explain what dictated these decisions
|
- Free-form list of considerations that explain what dictated these decisions
|
||||||
|
|
||||||
## Priority levels
|
#### Checklist priority levels
|
||||||
|
|
||||||
The items in each checklist include the priority level, which we hope will
|
The items in each checklist include the priority level, which we hope will
|
||||||
help guide your decision:
|
help guide your decision:
|
||||||
|
|
Loading…
Reference in a new issue