A SysAdmin’s Essential Guide to Linux Workstation Security
How to work from anywhere and keep your data, identity, and sanity
By Konstantin Ryabitsev
Director of IT Infrastructure Security
at The Linux Foundation
This document is aimed at teams of systems administrators who use
Linux workstations to access and manage your project’s IT infrastructure.
If your systems administrators are remote workers, you may use this set
of guidelines to help ensure that their workstations pass core security
requirements in order to reduce the risk that they become attack vectors
against the rest of your IT infrastructure.
Even if your systems administrators are not remote workers, chances
are that they perform a lot of their work either from a portable laptop in
a work environment, or set up their home systems to access the work
infrastructure for after-hours/emergency support. In either case, you can
adapt this set of recommendations to suit your environment.
尊敬的读者:
欢迎您访问我们的网站。本站的初衷是为大家提供一个共享学习资料、交换知识的平台。每位用户都可以将文件上传至网盘并分享。
然而,随着用户上传的资料增多,我们发现部分不宜或版权问题的书籍被分享到了本站。
为此,我们已经关闭了分享入口,并进行了多次书籍审查,但仍有部分内容未能彻底审查到位。
在此,我们恳请广大读者与我们共同监督,如发现任何不宜内容,请 点击此处 进行举报,我们会第一时间处理并下架相关内容。
希望我们能共建一个文明社区!感谢您的理解与支持!