International Journal of Leading Research Publication

E-ISSN: 2582-8010     Impact Factor: 9.56

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 6 Issue 4 April 2025 Submit your research before last 3 days of to publish your research paper in the issue of April.

Process of OS Security Hardening – Red Hat Enterprise Linux

Author(s) Satish Kumar Malaraju
Country United States
Abstract Operating system security hardening is essential to mitigating cyber threats, particularly in enterprise and critical infrastructure environments. This paper explores the systematic process of security hardening in Red Hat Enterprise Linux (RHEL), focusing on key components such as access control, kernel-level security, compliance frameworks, and automated threat detection. It examines practical implementation strategies, including SELinux enforcement, network segmentation, and continuous monitoring, ensuring resilience against unauthorized access and system exploitation. Additionally, a case study on securing a power grid control system highlights real-world applications of RHEL hardening measures. By adopting a layered security approach, organizations can enhance system integrity, minimize attack surfaces, and ensure compliance with industry standards.
Keywords OS Security Hardening, Red Hat Enterprise Linux, RHEL, SELinux, Access Control, Threat Detection, Compliance, Kernel Security, Network Segmentation, Critical Infrastructure Security
Field Computer Applications
Published In Volume 1, Issue 2, October 2020
Published On 2020-10-07
Cite This Process of OS Security Hardening – Red Hat Enterprise Linux - Satish Kumar Malaraju - IJLRP Volume 1, Issue 2, October 2020.

Share this