From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

System administration hardening

System administration hardening - Linux Tutorial

From the course: Linux Hardening

System administration hardening

Hello and welcome back to Cybrary's Linux Hardening course. In this lesson, we're going to cover system administration. I'm your instructor, Corey Holzer. Let's begin. There are two objectives for this lesson. First, I want you to walk away from this lesson being able to describe the why and how behind disabling the root account's remote access. I also want you to know the role of the sudo command and how to configure it. One of the goals of every threat actor who infiltrates a network is to gain elevated permissions. The highest of privileges are those of the root account. With root privileges, the adversary has almost unlimited power on a given workstation. Therefore, we want to make his attempts to gain root privileges as difficult as possible. In this case, we want to disable remote access for the root account. We do this by editing the sshd_config file in /etc/ssh. And in that file we changed the value for permit route login to no. All we need to do at that point is save the file…

Contents