[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115190

 
 

909

 
 

90025

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 328 Download | Alert*

The /etc/gshadow file should be owned by the appropriate group.

SSH's cryptographic host-based authentication is more secure than .rhosts authentication. However, it is not recommended that hosts unilaterally trust one another, even within an organization.

This test makes sure that '/etc/passwd' has proper permission. If the target file or directory has an extended ACL then it will fail the mode check.

The /etc/group file should be owned by the appropriate user.

The gpgcheck option should be used to ensure that checking of an RPM package's signature always occurs prior to its installation.

The minimum password age policy should be set appropriately.

The /etc/group file should be owned by the appropriate group.

Limit the ciphers to those which are FIPS-approved and only use ciphers in counter (CTR) mode.

The SSH ClientAliveCountMax should be set to an appropriate value (and dependencies are met)

The password minimum length should be set appropriately.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   32

© SecPod Technologies