International Journal of Leading Research Publication
E-ISSN: 2582-8010
•
Impact Factor: 9.56
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 1
January 2026
Indexing Partners
Process of OS Security Hardening - Red Hat Enterprise Linux
| Author(s) | Satish Kumar Malaraju |
|---|---|
| Country | United States |
| Abstract | Operating system security hardening is essential to mitigating cyber threats, particularly in enterprise and critical infrastructure environments. This paper explores the systematic process of security hardening in Red Hat Enterprise Linux (RHEL), focusing on key components such as access control, kernel-level security, compliance frameworks, and automated threat detection. It examines practical implementation strategies, including SELinux enforcement, network segmentation, and continuous monitoring, ensuring resilience against unauthorized access and system exploitation. Additionally, a case study on securing a power grid control system highlights real-world applications of RHEL hardening measures. By adopting a layered security approach, organizations can enhance system integrity, minimize attack surfaces, and ensure compliance with industry standards. |
| Keywords | OS Security Hardening, Red Hat Enterprise Linux, RHEL, SELinux, Access Control, Threat Detection, Compliance, Kernel Security, Network Segmentation, Critical Infrastructure Security |
| Field | Computer Applications |
| Published In | Volume 1, Issue 2, October 2020 |
| Published On | 2020-10-07 |
| DOI | https://doi.org/10.70528/IJLRP.v1.i2.1474 |
| Short DOI | https://doi.org/g9g9ss |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJLRP DOI prefix is
10.70528/IJLRP
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.