How to use Sudo Policy Effectively .
Security Feature in LINUX , UNIX and Windows.
Windows OS:-
LINUX/ UNIX OS:-
one of the unhealthy practice is login as root to server , how ? if you have the root password you can login as root user no issue , but if you use root and doing there day to day activities then what happened? For instance if you are Team lead of Unix team and you handle more 1000 Linux server box and you have the password for the root user and share within your team and team doing the day to day operation , team will happy because they are using root access and mistakenly someone from team executed some command and remove critical file then what happens? or one more example someone from your team left the organization and he has the password of every system then its another threat to security ? so you decided to change the password and again distributed within team
for day to day operation . So instead of doing this what if you just want users to have admin privileges only for certain task,instead of having full root privileges?
who is Savior , who can save us any clue guys ?
Sudo
I guess someone called me , Don't worry i will come to rescue you,here we make some idea divided activities like admin privileges activities among normal regular user and admin user without login as root user. so plan is without login as root user we can still perform the admin task how lets explore sudo policy.
Well back soon withe Some Hands on Example.
Security Feature in LINUX , UNIX and Windows.
Windows OS:-
- In older day's window OS has lots loophole in security area like virus infection , not proper management of normal user and Privileges users.
- Now-day new window OS uses User access control (UAC) to protect the user , but still not quite but there is always chance of virus infection on windows server.
LINUX/ UNIX OS:-
- From the beginning its hard to break security for Linux.
- Linux/UNIX always do good job to manage the Privileges administrative uses and Normal user.
- Root is powerful account in Unix/Linux. If your take login as root then you are the God of system you can do anything , whatever you want to do. You feel like god of system. for eg. Wipe out entire system, remove anything from the server.
- Login as Root there always threat to system . You are the threat because you login as root user. or you threat the entire system security and critical operation by login as root user without proper process.
one of the unhealthy practice is login as root to server , how ? if you have the root password you can login as root user no issue , but if you use root and doing there day to day activities then what happened? For instance if you are Team lead of Unix team and you handle more 1000 Linux server box and you have the password for the root user and share within your team and team doing the day to day operation , team will happy because they are using root access and mistakenly someone from team executed some command and remove critical file then what happens? or one more example someone from your team left the organization and he has the password of every system then its another threat to security ? so you decided to change the password and again distributed within team
for day to day operation . So instead of doing this what if you just want users to have admin privileges only for certain task,instead of having full root privileges?
who is Savior , who can save us any clue guys ?
Sudo
I guess someone called me , Don't worry i will come to rescue you,here we make some idea divided activities like admin privileges activities among normal regular user and admin user without login as root user. so plan is without login as root user we can still perform the admin task how lets explore sudo policy.
Well back soon withe Some Hands on Example.