First page Back Continue Last page Summary Graphics
Security Planning
You need to determine, in broad terms, your security posture.
Consider the purpose of the machine. A public ftp server will usually have looser security than a firewall. Do you need to run a vulnerable service like anonymous ftp or nfs? If it is on an exposed network or exposed host, you need to decide if it is critical enough to risk a possible compromise.
In broad terms, this posture will fall into one of two categories:
Everything not specifically denied is implicitly allowed.
Everything not specifically allowed is implicitly denied.
The latter option is the more secure posture.
Notes: