Linux System Integrity Explained: Ensure Data, Logging and Kernel Integrity


Michael Boelen


Information security helps protecting this valuable data, by ensuring its availability, integrity, and confidentiality. What systems have the most valuable data stored? File system integrity The last category worth mentioning is tooling which monitors file changes. Usually these are stored as binaries on disk. Options: Use IMA/EVM for high sensitive systems Implement file integrity monitoring Log integrity Logging is the process of storing events in a certain way, for later access.


Visit Link


Tags: