Security demos for Red Hat Enterprise Linux

Updated -

Available years:

Red Hat Enterprise Linux (RHEL) includes critical security features and settings which you can implement to better secure your infrastructure from potential security attacks and breaches. RHEL security covers several layers for your systems:

  • Software-level security features like audit logging and audit intrusion detection, session recording, and cryptographic policies
  • Hardware-level security features such as USBGuard
  • Network-level security such as firewalld, port security, and IPSec
  • User-level security with identity management and system roles
  • Data-level security with Linux Unified Key Setup (LUKS), Network Bound Disk Encryption (NBDE), and GNU Privacy Guard (GPG)

There are numerous technologies, configuration options, and services available for you to define security policies and procedures for your infrastructure. But it can be difficult to get started, especially as security technologies evolve.

To help you get started, we’ve created demos and hands-on labs — with hosted Ansible and RHEL environments — for you to configure and test key security technologies within RHEL, including applications like Red Hat Identity Management. As you become more familiar with the security features within RHEL, you can better plan and implement security across your infrastructure and with applications associated with RHEL, such as workloads running in the cloud or containers running on Red Hat OpenShift.

Check out the different RHEL security labs on github, or you can read ebooks and other assets around RHEL security at www.engage.redhat.com/discover-more.

Comments