
International Journal of Leading Research Publication
E-ISSN: 2582-8010
•
Impact Factor: 9.56
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 4
April 2025
Indexing Partners



















Process of OS Security Hardening – Red Hat Enterprise Linux
Author(s) | Satish Kumar Malaraju |
---|---|
Country | United States |
Abstract | Operating system security hardening is essential to mitigating cyber threats, particularly in enterprise and critical infrastructure environments. This paper explores the systematic process of security hardening in Red Hat Enterprise Linux (RHEL), focusing on key components such as access control, kernel-level security, compliance frameworks, and automated threat detection. It examines practical implementation strategies, including SELinux enforcement, network segmentation, and continuous monitoring, ensuring resilience against unauthorized access and system exploitation. Additionally, a case study on securing a power grid control system highlights real-world applications of RHEL hardening measures. By adopting a layered security approach, organizations can enhance system integrity, minimize attack surfaces, and ensure compliance with industry standards. |
Keywords | OS Security Hardening, Red Hat Enterprise Linux, RHEL, SELinux, Access Control, Threat Detection, Compliance, Kernel Security, Network Segmentation, Critical Infrastructure Security |
Field | Computer Applications |
Published In | Volume 1, Issue 2, October 2020 |
Published On | 2020-10-07 |
Cite This | Process of OS Security Hardening – Red Hat Enterprise Linux - Satish Kumar Malaraju - IJLRP Volume 1, Issue 2, October 2020. |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJLRP DOI prefix is
10.70528/IJLRP
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
