
Change-Id: Ie880f005319a1b0c5bfead3ba4ad2ed90c862cd9 Signed-off-by: Jonathan Rosser <jonathan.rosser@rd.bbc.co.uk>
449 B
449 B
auth - Authentication
User or automated authentication to a Linux system must be closely monitored and carefully configured to prevent unauthorized access.
Overview
Most of the STIG requirements for authentication are already included in Linux distributions by default or are easily applied without disruptions. Deployers should review the documentation below and test all changes on a non-production system first.