From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Zero-trust environment mindset

Zero-trust environment mindset

- Let's review a concept that we talked about previously, the zero-trust mindsets. And if you look at the slide here, I've got the big cube, trust nothing and authenticate everything. That is the zero-trust environment mindset. That's what you want to implement in your infrastructure. But think outside the box. Make sure you understand what you're authenticating. Well, it's going to be users, it's going to be computers, it's going to be network sessions, ports, services, programs, codes, scripts, you name it. Authenticate anything you can think of, internal and external to your network. Let's do a quick test here, and I'm going to run the netcat command on my system and send it out and take a look at one of my systems on my local area network. And I'll just pick one at random. We'll do a -V and do a 10.42.0.1. What I want to see is whether or not port 53 is open and running. So I'll run that now. And look, it says connection to that port succeeded. So on that IP address, port 53 is…

Contents