Skip to content
This repository was archived by the owner on Aug 24, 2020. It is now read-only.

Latest commit

 

History

History
76 lines (61 loc) · 3.5 KB

File metadata and controls

76 lines (61 loc) · 3.5 KB

Telekom Security Compliance Framework

Linux is a popular operating system for server systems. It is used from single bare metal servers to high scaling cloud environments.

This documents includes examples for technical implementation and compliance checks for the security requirements of Telekom Security for Linux OS for servers [Doc. 'SecReq 3.65: Linux OS for Servers'].

The examples in this document are tested for the following Linux distributions:

  • Ubuntu LTS 14.04

  • Ubuntu LTS 16.04

  • Ubuntu LTS 18.04

  • RedHat Enterprise Linux 7.x (RHEL)

  • CentOS 7.x (CentOS)

  • Oracle Linux 7.x (Oracle)

  • Amazon Linux AMI (v2)

  • Suse Linux Enterprise Server 15 (SLES)

RHEL, CentOS, Oracle and Amazon Linux are summarized in the following documents as 'RedHat'.

ℹ️
Root privileges are needed to perform compliance checks and to implement needed configuration for the security requirements on a Linux system.

In scope of this is document are server systems with Linux OS. This includes the following types of servers:

  • bare metal servers

  • virtualized servers (VMs)

  • virtualization hosts

This document is not intended to be used for workstations with Linux OS and container images based on Linux. Because of different use cases, associated threats and needed software, workstations need another set of requirements. Container images have to be treated differently as they normally do not include a full Linux OS.


Telekom Security provides Ansible roles for an automated implementation of security requirements. This Ansible roles can be found on following page: