If you are “getting by” with sudo right now, you’re probably familiar with its shortcomings (e.g., complexity, decentralization, lack of log integrity and enterprise support, etc.). There are easier ways to protect root accounts, enforce least privilege, and ensure compliance! The Simplifying Unix & Linux Security Strategy Guide covers all the basics, including:
Get your strategy guide now!