1. Setting up our Bastion Host
We launch our Bastion Host and connect to it independent of SSH.
We launch our Bastion Host and connect to it independent of SSH.
We SSH in and briefly review the state of SELinux on the host.
Learn how to steal credentials from another tenant's SSH agent.
Install the SELinux tools, enable SELinux and integrate with PAM and SSH.
Learn about auditd and ausearch and what type of events SELinux logs upon policy violations.
Recap on where we're at currently?
An overview of the protections we're trying to add to fortify this bastion host.
We learn about the thing we're trying to protect in the lab.