From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Hardening the bootloader

Hardening the bootloader - Linux Tutorial

From the course: Linux Hardening

Hardening the bootloader

Hello, and welcome to Cybrary's Hardening Linux course, and this lesson which focuses on the hardening of the bootloader. I'm your instructor, Corey Holzer. So let's get started. This lesson has two learning objectives. At the end of this lesson, you will be able to describe the role of the bootloader, and you will be able to describe the different steps for securing the bootloader via passwords and permissions. So what is the bootloader? As we mentioned in module two, the bootloader handles the process of loading the operating system into memory. When there are multiple operating systems on the workstation or server, the bootloader gives the user at the keyboard the opportunity to choose which OS to run. The bootloader can be made more secure through the assignment of passwords to the different operating system options. Also, we can limit the access to the different options based on a username. Protecting the bootloader reduces the possibility of a user starting a version of the…

Contents