S 4.26 Regular security checks of Unix systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Unix operating systems offer various security features by default. These can only be successful if they are used sensibly. The settings required for this should be automatically verified by tools to

This check can be done using programs available in the Unix system, self-created shell scripts, or public domain programs. For some Unix versions, commercial programs are also available.

Examples:

Review questions: