Skip to main content
 

This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy.

The following scripts can be used to configure the system.

https://adminliveunc.sharepoint.com/sites/pharmacy/itsop/Downloads/rhel7_setup.zip

 

Monthly Vulnerability Scanning

The UNC Information Security Policy requires Monthly Vulnerability Scanning for all “mission critical” or “sensitive” systems.

This document describes how to configured authenticated Qualys scans on Linux https://help.unc.edu/help/setup-procedures-for-authenticated-qualys-scans-in-unix-2/

For convenience you can run the qualys_account.sh script

Incident Management Plan

https://itsop.unc.edu/onyen-restricted/procedures/incident-management/

Basic Security Awareness For End Users

All affiliates are responsible for completing the annual training module at https://itsapps.unc.edu/ITSSelfStudy.

Formal Administrator Security Training

Anyone with root privilege (i.e., members of wheel; able to su or sudo) should register as a system administrator at https://sai.unc.edu and enroll/complete the training through sakai https://help.unc.edu/help/system-administration-initiative-sai-faq/

Comments are closed.