2.2. Host Security Recommended Practices for Red Hat Enterprise Linux