Home Blog Page 580

How to Choose the Best Linux Distro for SysAdmin Workstation Security

Learn how to work from anywhere and keep your data, identity, and sanityDOWNLOAD NOW

If you’re a systems administrator choosing a Linux distribution for your workstation, chances are you’ll stick with a fairly widely used distro such as Fedora, Ubuntu, Arch, Debian, or one of their close spin-offs. Still, there are several security considerations you should weigh when picking which distribution is best for your needs.

You’ll want a distro that:

  • Has a robust MAC/RBAC implementation such as SELinux/AppArmor/GrSecurity (ESSENTIAL)

  • Publishes security bulletins (ESSENTIAL)

  • Provides timely security patches (ESSENTIAL)

  • Provides cryptographic verification of packages (ESSENTIAL)

  • Fully supports UEFI and SecureBoot (ESSENTIAL)

  • Has robust native full disk encryption support (ESSENTIAL)

These considerations are part of the guidelines The Linux Foundation gives our own remote team of sysadmins to reduce the risk that they become attack vectors against the rest of our IT infrastructure. You may also want to read our previous posts on how to choose hardware and considerations for a pre-boot environment. Or you can download our full set of recommendations in a handy ebook.

SELinux, AppArmor, and GrSecurity/PaX

Mandatory Access Controls (MAC) or Role-Based Access Controls (RBAC) are an extension of the basic user/group security mechanism used in legacy POSIX systems. Most distributions these days either already come bundled with a MAC/RBAC implementation (Fedora, Ubuntu) or provide a mechanism to add it via an optional post-installation step (Gentoo, Arch, Debian). Obviously, it is highly advised that you pick a distribution that comes preconfigured with a MAC/RBAC system, but if you have strong feelings about a distribution that doesn’t have one enabled by default, do plan to configure it post-installation.

Distributions that do not provide any MAC/RBAC mechanisms should be strongly avoided, as traditional POSIX user- and group-based security should be considered insufficient in this day and age. If you would like to start out with a MAC/RBAC workstation, AppArmor and GrSecurity/PaX are generally considered easier to learn than SELinux. Furthermore, on a workstation, where there are few or no externally listening daemons, and where user-run applications pose the highest risk, GrSecurity/PaX will offer more security benefits than just SELinux.

Distro security bulletins

Most of the widely used distributions have a mechanism to deliver security bulletins to their users, but if you are fond of something esoteric, check whether the developers have a documented mechanism of alerting the users about security vulnerabilities and patches. Absence of such a mechanism is a major warning sign that the distribution is not mature enough to be considered for a primary admin workstation.

Timely and trusted security updates

Most of the widely used distributions deliver regular security updates, but it’s worth checking to ensure that critical package updates are provided in a timely fashion. Avoid using spin-offs and “community rebuilds” for this reason, as they routinely delay security updates due to having to wait for the upstream distribution to release it first.

These days, it is hard to find a distribution that does not use cryptographic signatures on packages, updates metadata, or both. That said, fairly widely used distributions have been known to go for years before introducing this basic security measure (Arch, I’m looking at you), so this is something worth checking.

Distros supporting UEFI and SecureBoot

Check that the distribution supports UEFI and SecureBoot. Find out whether it requires importing an extra key or whether it signs its boot kernels with a key already trusted by systems manufacturers (e.g. via an agreement with Microsoft). Some distributions do not support UEFI/ SecureBoot but offer alternatives to ensure tamper-proof or tamper- evident boot environments (Qubes-OS uses Anti Evil Maid, mentioned in a previous post). If a distribution doesn’t support SecureBoot and has no mechanisms to prevent boot-level attacks, look elsewhere.

Full disk encryption

Full disk encryption is a requirement for securing data at rest, and is supported by most distributions. As an alternative, systems with self- encrypting hard drives may be used (normally implemented via the on-board TPM chip) and offer comparable levels of security plus faster operation, but at a considerably higher cost.

In our next article, we’ll give some general distro installation guidelines. All distributions are different, but there are some good rules of thumb including a recommended encryption strategy, guidelines for choosing good passwords, password configuration for user- and admin-level accounts, and more.

Whether you work from home, log in for after-hours emergency support, or simply prefer to work from a laptop in your office, you can use A SysAdmin’s Essential Guide to Linux Workstation Security to do it securely. Download the free ebook and checklist now!

Read more:

3 Security Features to Consider When Choosing a Linux Workstation

4 Security Steps to Take Before You Install Linux

Women Still Only 11% Of Global InfoSec Workforce

Career development and mentorship programs make women in cybersecurity feel more valued, increase women’s success. The global cybersecurity workforce remains stagnant at just 11 percent, according to the 2017 Women in Cybersecurity Report, co-authored by The Executive Women’s Forum on Information Security, Risk Management and Privacy (EWF) and the Center for Cyber Safety and Education, which partnered with (ISC)2.

The report is based on survey responses from over 19,000 information security professionals in 170 countries.  Report co-author and EWF founder Joyce Brocaglia says the most important finding of the report is that “it isn’t just one thing” causing the persistent shortage of women in information security, but rather a “confluence of events.”

Read more at DarkReading

Parity Check: Expectations Around Monitoring Have Changed

For the last few years, pundits have been telling us that IT monitoring is no longer just about up-time. As we previously reportedthere are two new expectations for monitoring: 1) tools should help improve performance (both IT and business) and 2) data from multiple systems should be integrated to provide a holistic picture.

Monitoring software company BigPanda recently published its second annual State of Monitoring report, which provides data and a few answers. It is based on responses from over 1,500 IT pros. When comparing the 2017 and 2016 reports we found that many things have not changed. 

The top IT concerns are about security and downtime. 

Read more at The New Stack

Top 10 Challenges to DevOps Implementation

As more companies adopt DevOps to improve their workflow and productivity, a number of challenges related to infrastructure and legacy systems have arisen, according to a new survey from cloud sandbox software provider Quali.

In a survey of more than 2,000 IT industry executives, 54% of respondents said they had no access to self-service infrastructure—instead, they take a ticket-based approach to infrastructure delivery, which impacts productivity and increases time to market, the survey notes. And only 23% of executives said infrastructure could be delivered in less than 24 hours, while 33% said it takes up to a month to do so. Some 26% said it takes one month or more.

Read more at TechCrunch

Mesosphere Extends Data Services Reach

As critical as container orchestration itself might be, most IT organizations view that capability as the means to a larger end. To drive that point home even further, Mesosphere this week has released an update to its DC/OS platform that provides access to more than 100 different data services based on containers, all deployable via a single click. Those services span everything from data services based on offerings from Alluxio, DataStax, Couchbase, Elastic and Redis Labs to message queues and analytics engines.

While other container orchestration platforms might have broader vendor support, Ed Hsu, vice president of product marketing, says DC/OS hosts more containers running in production environments than any other platform. A recent survey of slightly fewer than 500 users of Mesosphere found that 62 percent of the respondents are running containers in a production environment.

Read more at ContainerJournal

An Introduction to GRUB2 Configuration for your Linux Machine

When researching my article from last month, An introduction to the Linux boot and startup process, I became interested in learning more about GRUB2. This article provides a quick introduction to configuring GRUB2, which I will mostly refer to as GRUB for simplicity.

GRUB

GRUB stands for GRand Unified Bootloader. Its function is to take over from BIOS at boot time, load itself, load the Linux kernel into memory, and then turn over execution to the kernel. Once the kernel takes over, GRUB has done its job and it is no longer needed.

GRUB supports multiple Linux kernels and allows the user to select between them at boot time using a menu. I have found this to be a very useful tool because there have been many instances that I have encountered problems with an application or system service that fails with a particular kernel version. Many times, booting to an older kernel can circumvent issues such as these. By default, three kernels are kept–the newest and two previous–when yum or dnfare used to perform upgrades. 

Read more at OpenSource.com

Keynote: Building and Motivating Engineering Teams – Camille Fournier, Senior Thinker and Raconteur

https://www.youtube.com/watch?v=7R-Y2DwWOr0?list=PLbzoR-pLrL6rm2vBxfJAsySspk2FLj4fM

Maintaining respect is key to building a successful team, according to Camille Fournier, at the Open Source Leadership Summit in February.

 

Keynote: An Exploration of Citrix Delivery Networks by Danny Phillips

Danny Phillips of Citrix discusses NetScaler, an Application Delivery Controller, which is basically a load balancer with some extra features at LinuxCon Europe.
 

 

Making an Amazon Echo Compatible Linux System – Michael E Anderson, The PTR Group, Inc.

https://www.youtube.com/watch?v=v7cnNauG9VY?list=PLbzoR-pLrL6pSlkQDW7RpnNLuxPq6WVUR

Learn how the Amazon Echo interfaces to Amazon Voice Services and how to construct your very own Amazon Echo using an embedded Linux platform. We will explain how the “skills” interface works, the issues with voice recognition, and how to use AVS to perform command recognition to do simple tasks. 

Growing Up Node by Trevor Livingston, HomeAway

https://www.youtube.com/watch?v=m4Wpx4Ul5fs?list=PLfMzBWSH11xYaaHMalNKqcEurBH8LstB8

Trevor Livingston, principal architect at HomeAway, offers insight on how to introduce Node into companies at Node.js Interactive.