Linux Security Scanning with Lynis

Providing companies a software solution to audit their systems (Linux, macOS, UNIX) at CISOfy
May. 11, 2016
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
Linux Security Scanning with Lynis
1 of 52

More Related Content

What's hot

Linux kernelLinux kernel
Linux kernelGoutam Sahoo
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
Linux and its historyLinux and its history
Linux and its historyKamal Ahmed
Linux securityLinux security
Linux securitytrilokchandra prakash
Unix pptUnix ppt
Unix pptDr Rajiv Srivastava
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonHariharan Ganesan

Viewers also liked

How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?Michael Boelen
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsAnne Nicolas
Linux Security for DevelopersLinux Security for Developers
Linux Security for DevelopersMichael Boelen
Security and Linux SecuritySecurity and Linux Security
Security and Linux SecurityRizky Ariestiyansyah
Linux Security MythLinux Security Myth
Linux Security MythMackenzie Morgan
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux SecurityMichael Boman

Similar to Linux Security Scanning with Lynis

Understanding SELinux For the WinUnderstanding SELinux For the Win
Understanding SELinux For the Winbmbouter
BSidesPGH 2019BSidesPGH 2019
BSidesPGH 2019BrianGardiner12
The State of Security Enhanced Linux - FOSS.IN/2007The State of Security Enhanced Linux - FOSS.IN/2007
The State of Security Enhanced Linux - FOSS.IN/2007James Morris
Docker Security - Secure Container Deployment on LinuxDocker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on LinuxMichael Boelen
Linux Day2Linux Day2
Linux Day2Bùi Quang Lâm
Splunk, SIEMs, and Big Data - The Undercroft - November 2019Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk, SIEMs, and Big Data - The Undercroft - November 2019Jonathan Singer

More from Michael Boelen

Lets make better scriptsLets make better scripts
Lets make better scriptsMichael Boelen
Getting Traction for (your) Open Source ProjectsGetting Traction for (your) Open Source Projects
Getting Traction for (your) Open Source ProjectsMichael Boelen
Dealing with Linux MalwareDealing with Linux Malware
Dealing with Linux MalwareMichael Boelen
Handling of compromised Linux systemsHandling of compromised Linux systems
Handling of compromised Linux systemsMichael Boelen
Commercieel gaan met je open source projectCommercieel gaan met je open source project
Commercieel gaan met je open source projectMichael Boelen
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Michael Boelen

Recently uploaded

The art of AI ArtThe art of AI Art
The art of AI ArtDennis Vroegop
Seaside HotwiredSeaside Hotwired
Seaside HotwiredESUG
 Database storage engine internals.pptx Database storage engine internals.pptx
Database storage engine internals.pptxAdewumiSunkanmi
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Gr...Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Gr...
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Gr...Raffi Khatchadourian
Analyzing Dart Language with Pharo: Report and early resultsAnalyzing Dart Language with Pharo: Report and early results
Analyzing Dart Language with Pharo: Report and early resultsESUG
Kubernetes with Cilium in AWS - Experience Report!Kubernetes with Cilium in AWS - Experience Report!
Kubernetes with Cilium in AWS - Experience Report!QAware GmbH

Linux Security Scanning with Lynis