A 170 page PDF about securely configuring Red Hat, written by and for
the government. If you look around on NSA.gov
The United States National Security Agency has created some excellent guides for securely configuring today’s more popular operating systems. Check out the links below for PDF copies of the guides.
From the National Security Agency and Central Security Service Website:
“NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline [for] their systems.”
Mac OS X
- Mac OS X Security Configuration for Version 10.5 Leopard Second Edition.
- Hardening Tips for the Default Installation of Mac OS X 10.5 “Leopard”.
- Guide to the Secure Configuration of Red Hat Enterprise Linux 5.
- Hardening Tips for the Red Hat Enterprise Linux 5.
- CIS Solaris 10 Benchmark v4.0.
- An Overview of Solaris 10 Operating System Security Controls.
- Guide to Secure Configuration of Solaris 9.
For more information and guides to additional operating systems refer to the National Security Agency and Central Security Service’s Operating Systems Website listed below: