Skip to content

Commit d152cc8

Browse files
committedMar 3, 2019
updated README.md
- signed-off-by: trimstray <trimstray@gmail.com>
1 parent 0cd1c1e commit d152cc8

File tree

1 file changed

+11
-3
lines changed

1 file changed

+11
-3
lines changed
 

‎README.md

+11-3
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
<br>
44

55
<p align="center">
6-
<img src="https://github.com/trimstray/the-practical-linux-hardening-guide/blob/master/doc/img/main_preview.jpg"
6+
<img src="https://github.com/trimstray/the-practical-linux-hardening-guide/blob/master/static/img/main_preview.jpg"
77
alt="Master">
88
</p>
99

@@ -38,8 +38,6 @@
3838

3939
<br>
4040

41-
<p align="center"><code>I'm back, work in progress...</code>
42-
4341
****
4442

4543
# Table of Contents
@@ -86,6 +84,16 @@ Please also remember:
8684

8785
> This guide also contains my comments that may differ from certain industry principles. If you are not sure what to do please see **[Policy Compliance](#policy-compliance)**.
8886
87+
This guide use following [OpenSCAP](https://www.open-scap.org/) configurations:
88+
89+
- [U.S. Government Commercial Cloud Services (C2S) baseline inspired by CIS v2.1.1](https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-C2S.html)
90+
91+
> C2S for Red Hat Enterprise Linux 7 v0.1.43.
92+
93+
- [Red Hat Enterprise Linux 7 Security Technical Implementation Guide (STIG)](https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/)
94+
95+
> The requirements are derived from the (NIST) 800-53 and related documents.
96+
8997
### The Importance of Hardening Linux
9098

9199
Simply speaking, hardening is the process of making a system more secure. Out of the box, Linux servers don’t come "hardened" (e.g. with the attack surface minimized). It’s up to you to prepare for each eventuality and set up systems to notify you of any suspicious activity in the future.

0 commit comments

Comments
 (0)
Failed to load comments.