generally , in company securiy reveal aground following three thing
1) Authentication : Authentication can be done by any of the following
a) MIT KDC
b) Active Directory
c) Red HatIPA
2) Authorization : Authorization done by follwing ways
a) Linux Posix Permission
b) Extended ACL'S
c) Sticky Bit
d) Sentry
3) Encryption : Encryption is another common solution used to secure data both at rest and in motion
for at rest : We Create an Encryption Zone
for in motion: We Install an SSL/TLS Certificate.
following some of the screenshot to give clue of how to secure cluster.
No comments:
Post a Comment