Defend yourself using built-in Red Hat Enterprise Linux security technologies

In this lab, you'll learn about the built-in security technologies available to you in Red Hat Enterprise Linux.

You will use OpenSCAP to scan and remediate against vulnerabilities and configuration security baselines. You will then block possible attacks from vulnerabilities using Security-Enhanced Linux (SELinux) and use Network Bound Disk Encryption to securely decrypt your encrypted boot volumes unattended. You will also use USBGuard to implement basic whitelisting and blacklisting to define which USB devices are and are not authorized and how a USB device may interact with your system. Throughout your investigation of the security issues in your systems, you will utilize the improved audit logs and automate as many of your tasks as possible using Red Hat Ansible Automation. Finally, you will make multiple configuration changes to your systems across different versions of Red Hat Enterprise Linux running in your environment, in an automated fashion, using the Systems Roles feature.

  • Date:Tuesday, May 8
  • Time:1:00 PM - 3:00 PM
  • Room:155
  • Location:Moscone South - 155
  • Session Type:Instructor-led lab
  • Session Code:L1036
  • Technical difficulty:Working knowledge required
  • Best for people who:Manage infrastructure, Provide technical support
  • Products and Services:Red Hat Enterprise Linux, Red Hat Ansible Automation
  • Session Includes:Demo
  • Topic(s):Application delivery, DevOps, Infrastructure modernization and optimization, Security, Management and automation
  • Primary solution:Linux platforms
  • Time slot:Afternoon
Speakers
Lucy Kerner
Red Hat
Paul Moore
Red Hat
Martin Preisler
Red Hat
Peter Beniaris
Red Hat, Inc.
Lukas Vrabec
Red Hat
Back