< Previous | Contents | Next >
Chapter 9. Security
Security should always be considered when installing, deploying, and using any type of computer system. Although a fresh installation of Ubuntu is relatively safe for immediate use on the Internet, it is important to have a balanced understanding of your system's security posture based on how it will be used after deployment.
This chapter provides an overview of security-related topics as they pertain to Ubuntu 18.04 LTS Server Edition, and outlines simple measures you may use to protect your server and network from any number of potential security threats.
1. User Management1.1. Where is root?1.2. Adding and Deleting Users1.3. User Profile Security1.4. Password Policy1.4.1. Minimum Password Length1.4.2. Password Expiration1.5. Other Security Considerations1.5.1. SSH Access by Disabled Users1.5.2. External User Database Authentication2. Console Security2.1. Disable Ctrl+Alt+Delete3. Firewall3.1. Introduction3.2. ufw - Uncomplicated Firewall3.2.1. ufw Application Integration3.3. IP Masquerading3.3.1. ufw Masquerading3.3.2. iptables Masquerading3.4. Logs3.5. Other Tools3.6. References4. AppArmor4.1. Using AppArmor4.2. Profiles4.2.1. Creating a Profile4.2.2. Updating Profiles4.3. References5. Certificates5.1. Types of Certificates5.2. Generating a Certificate Signing Request (CSR)5.3. Creating a Self-Signed Certificate5.4. Installing the Certificate5.5. Certification Authority5.6. References6. eCryptfs6.1. Using eCryptfs6.2. Automatically Mounting Encrypted Partitions6.3. Other Utilities6.4. References