diff --git a/src/assets/downloads/u3/u3_worksheet.pdf b/src/assets/downloads/u3/u3_worksheet.pdf new file mode 100644 index 0000000..f9d17d6 Binary files /dev/null and b/src/assets/downloads/u3/u3_worksheet.pdf differ diff --git a/src/assets/downloads/u3/u3_worksheet.txt b/src/assets/downloads/u3/u3_worksheet.txt new file mode 100644 index 0000000..6519943 --- /dev/null +++ b/src/assets/downloads/u3/u3_worksheet.txt @@ -0,0 +1,79 @@ +ProLUG Security Engineering +Unit 3 Worksheet + +Instructions +Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until +the end to turn them in as a final submission packet. + +Discussion Questions: + +Unit 3 Discussion Post 1: There are 16 Stigs that involve PAM for RHEL 9. Read the guide +from Rocky Linux here: https://docs.rockylinux.org/guides/security/pam/ +1. What are the mechanisms and how do they affect PAM functionality? + a. Review /etc/pam.d/sshd on a Linux system, what is happening in that file + relative to these functionalities? + +2. What are the common PAM modules? + a. Review /etc/pam.d/sshd on a Linux system, what is happening in that file + relative to these functionalities? + +3. Look for a blog post or article about PAM that discusses real world application. Post + it here and give us a quick synopsis. (Bonus arbitrary points if you find one of our + ProLUG members blogs on the subject.) + +Unit 3 Discussion Post 2: Read about active directory (or LDAP) configurations of Linux via +sssd here: +https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/ +1. Why do we not want to just use local authentication in Linux? Or really any system? +2. There are 4 SSSD STIGS. + a. What are they? + b. What do they seek to do with the system? + +Definitions/Terminology + +PAM + +AD + +LDAP + +sssd + +oddjob + +krb5 + +realm/realmd + +wheel (system group in RHEL) + +Notes During Lecture/Class: + +Links: +- https://www.sans.org/information-security-policy/ +- https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ +- https://docs.rockylinux.org/guides/security/pam/ +- https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/ +- https://docs.rockylinux.org/books/admin_guide/06-users/ + +Terms: +Useful tools: +- STIG Viewer 2.18 +- SCC Tool (version varies by type of scan) +- OpenScap +Lab and Assignment +Unit3_Identity_and_Access_Management - To be completed outside of lecture time. +Digging Deeper + +1. How does /etc/security/access.conf come into play with pam_access? Read up on it +here: https://man7.org/linux/man-pages/man8/pam_access.8.html + a. Can you find any other good resources? + b. What is the structure of the access.conf file directives? + 2. What other important user access or user management information do you learn by +reading this? https://docs.rockylinux.org/books/admin_guide/06-users/ +a. What is the contents of the /etc/login.defs file? Why do you care? + +Reflection Questions + +1. What questions do you still have about this week? +2. How are you going to use what you’ve learned in your current role? diff --git a/src/u3ws.md b/src/u3ws.md index 50e68cb..44c58a0 100644 --- a/src/u3ws.md +++ b/src/u3ws.md @@ -1,6 +1,119 @@
-
+
+
+
+
+
+
+
+
+
+
+
+
+#### Discussion Post #1
+
+There are 16 Stigs that involve PAM for RHEL 9.
+Read the guide from Rocky Linux here: