
Change-Id: Ie880f005319a1b0c5bfead3ba4ad2ed90c862cd9 Signed-off-by: Jonathan Rosser <jonathan.rosser@rd.bbc.co.uk>
14 lines
449 B
ReStructuredText
14 lines
449 B
ReStructuredText
auth - Authentication
|
|
=====================
|
|
|
|
User or automated authentication to a Linux system must be closely monitored
|
|
and carefully configured to prevent unauthorized access.
|
|
|
|
Overview
|
|
--------
|
|
|
|
Most of the STIG requirements for authentication are already included in Linux
|
|
distributions by default or are easily applied without disruptions. Deployers
|
|
should review the documentation below and test all changes on a non-production
|
|
system first.
|