diff --git a/src/assets/downloads/u3/u3_worksheet.pdf b/src/assets/downloads/u3/u3_worksheet.pdf new file mode 100644 index 0000000..f9d17d6 Binary files /dev/null and b/src/assets/downloads/u3/u3_worksheet.pdf differ diff --git a/src/assets/downloads/u3/u3_worksheet.txt b/src/assets/downloads/u3/u3_worksheet.txt new file mode 100644 index 0000000..6519943 --- /dev/null +++ b/src/assets/downloads/u3/u3_worksheet.txt @@ -0,0 +1,79 @@ +ProLUG Security Engineering +Unit 3 Worksheet + +Instructions +Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until +the end to turn them in as a final submission packet. + +Discussion Questions: + +Unit 3 Discussion Post 1: There are 16 Stigs that involve PAM for RHEL 9. Read the guide +from Rocky Linux here: https://docs.rockylinux.org/guides/security/pam/ +1. What are the mechanisms and how do they affect PAM functionality? + a. Review /etc/pam.d/sshd on a Linux system, what is happening in that file + relative to these functionalities? + +2. What are the common PAM modules? + a. Review /etc/pam.d/sshd on a Linux system, what is happening in that file + relative to these functionalities? + +3. Look for a blog post or article about PAM that discusses real world application. Post + it here and give us a quick synopsis. (Bonus arbitrary points if you find one of our + ProLUG members blogs on the subject.) + +Unit 3 Discussion Post 2: Read about active directory (or LDAP) configurations of Linux via +sssd here: +https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/ +1. Why do we not want to just use local authentication in Linux? Or really any system? +2. There are 4 SSSD STIGS. + a. What are they? + b. What do they seek to do with the system? + +Definitions/Terminology + +PAM + +AD + +LDAP + +sssd + +oddjob + +krb5 + +realm/realmd + +wheel (system group in RHEL) + +Notes During Lecture/Class: + +Links: +- https://www.sans.org/information-security-policy/ +- https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ +- https://docs.rockylinux.org/guides/security/pam/ +- https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/ +- https://docs.rockylinux.org/books/admin_guide/06-users/ + +Terms: +Useful tools: +- STIG Viewer 2.18 +- SCC Tool (version varies by type of scan) +- OpenScap +Lab and Assignment +Unit3_Identity_and_Access_Management - To be completed outside of lecture time. +Digging Deeper + +1. How does /etc/security/access.conf come into play with pam_access? Read up on it +here: https://man7.org/linux/man-pages/man8/pam_access.8.html + a. Can you find any other good resources? + b. What is the structure of the access.conf file directives? + 2. What other important user access or user management information do you learn by +reading this? https://docs.rockylinux.org/books/admin_guide/06-users/ +a. What is the contents of the /etc/login.defs file? Why do you care? + +Reflection Questions + +1. What questions do you still have about this week? +2. How are you going to use what you’ve learned in your current role? diff --git a/src/u3ws.md b/src/u3ws.md index 50e68cb..44c58a0 100644 --- a/src/u3ws.md +++ b/src/u3ws.md @@ -1,6 +1,119 @@

-

Under Construction

+

Unit 2 Worksheet - Securing the Network Connection

+ +## Instructions + +--- + +Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until +the end to turn them in as a final submission packet. + +### Resources / Important Links + +- +- +- +- +- + +#### Downloads + +The worksheet has been provided below. The document(s) can be transposed to +the desired format so long as the content is preserved. For example, the `.txt` +could be transposed to a `.md` file. + +- 📥 u3_worksheet(`.pdf`) +- 📥 u3_worksheet(`.txt`) + + +### Unit 2 Recording + + + + + + + + + + + + + + +#### Discussion Post #1 + +There are 16 Stigs that involve PAM for RHEL 9. +Read the guide from Rocky Linux here: + +1. What are the mechanisms and how do they affect PAM functionality? + - Review `/etc/pam.d/sshd` on a Linux system. + What is happening in that file relative to these functionalities? +2. What are the common PAM modules? + - Review `/etc/pam.d/sshd` on a Linux system. + What is happening in that file relative to these functionalities? +3. Look for a blog post or article about PAM that discusses real world application. + Post it here and give us a quick synopsis. (Bonus arbitrary points if you find one of our ProLUG members blogs on the subject.) + +#### Discussion Post #2 + +Read about active directory (or LDAP) configurations of Linux via `sssd` here: + + +1. Why do we not want to just use local authentication in Linux? Or really any system? +2. There are 4 SSSD STIGS. + - What are they? + - What do they seek to do with the system? + +
+Submit your input by following the link below. + +The discussion posts are done in Discord threads. Click the 'Threads' icon on the top right and search for the discussion post. + +
+ +- [Link to Discussion Posts](https://discord.com/channels/611027490848374811/1098309490681598072) + +## Definitions + +--- + +PAM: + +AD: + +LDAP: + +sssd: + +oddjob: + +krb5: + +realm/realmd: + +wheel (system group in RHEL): + +## Digging Deeper + +--- + +1. How does `/etc/security/access.conf` come into play with pam_access? + Read up on it here: + - Can you find any other good resources? + - What is the structure of the access.conf file directives? +2. What other important user access or user management information do you learn by + reading this? + - What is the contents of the `/etc/login.defs` file? Why do you care? + +## Reflection Questions + +--- + +1. What questions do you still have about this week? + +2. How are you going to use what you've learned in your current role?