Because of the important business functions Linux servers support, they can be ripe targets for external attackers and rogue insiders. Privilege management is one way to limit unwanted access, but controls can’t be so overbearing that admin productivity suffers. This webinar will demonstrate some common techniques – some of the lesser-known “gotchas” – used by attackers to elevate their privileges in your Linux environment, as well as information about the tools we can put in your arsenal, including:

  • Shadow password suite
  • Special permissions
  • Plugable Authentication Modules
  • Network Authentication with NIS and LDAP
  • Authorizing access with Polkit
  • Possible attacks on the above technologies

Join us as we take a deep look into how we can make our Linux infrastructures more secure, but still functional for our users.