This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy.
The following scripts can be used to configure the system.
Monthly Vulnerability Scanning
The UNC Information Security Policy requires Monthly Vulnerability Scanning for all “mission critical” or “sensitive” systems.
This document describes how to configured authenticated Qualys scans on Linux https://help.unc.edu/help/setup-procedures-for-authenticated-qualys-scans-in-unix-2/
For convenience you can run the qualys_account.sh script
Incident Management Plan
Basic Security Awareness For End Users
All affiliates are responsible for completing the annual training module at https://itsapps.unc.edu/ITSSelfStudy.
Formal Administrator Security Training
Anyone with root privilege (i.e., members of wheel; able to su or sudo) should register as a system administrator at https://sai.unc.edu and enroll/complete the training through sakai https://help.unc.edu/help/system-administration-initiative-sai-faq/