Beyond Root: Securing Privileged Access in Linux with Sudo
Like UNIX, at its core, Linux’s secure model is basically monolithic. You either have root access or you don’t. But root access is too powerful for so many reasons. And routinely using the actual root account – while easy and still frighteningly common – is so dangerous it borders on negligent. Auditors know about root and what questions to ask. In fact some auditors already have their risk findings written up regarding root and privileged access before they even begin assessing your environment.
The good news is that there are a variety of things built on top if Linux to make privileged access more granular, more accountable, more auditable and overall more secure and in this webinar I’ll show you how root access and least privilege management works in Linux. You will learn about how administrators can still do their work efficiently without logging on as root. I will show you how sudo work and how you can use sudo to:
•limit which commands users can execute
•ensure accountability between admins
•eliminate logons as root
•create least privilege profiles that allow people to get their work down without sacrificing security
Read more at – Beyond Root: Securing Privileged Access in Linux with Sudo