You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: adoc/OS_Security_Hardening_Guide_for_SAP_HANA_SLES12.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ That prevented its use in many setups because each boot needed a manual step.
79
79
Remote Disk Encryption removes this manual step as it allows the encryption keys to be stored safely on a remote key server and to be automatically used during system boot.
80
80
81
81
Minimal package selection::
82
-
The fewer operating system packages anb SAP HANA system has installed, the less possible security holes it should have.
82
+
The fewer operating system packages SAP HANA system has installed, the less possible security holes it should have.
83
83
Following that principle, this guide describes which packages are absolutely necessary and which packages can be safely discarded.
84
84
As a positive side effect, a minimized number of packages also reduces the number updates and patches that have to be applied to a system.
85
85
@@ -105,7 +105,7 @@ Introduction to Linux security hardening
105
105
SUSE Linux Enterprise Server already provides a high level of security with the standard installation.
106
106
However, the standard security settings are generic, because they have to fit to all possible Linux server workloads.
107
107
Also, many security settings have impacts on the comfort of the system administration and possibly also for the users of the system.
108
-
Therefore, the SUSE Linux Enterprise Server 12 standard security settings provide a good tradeoff between compatibility to all workloads, administrative comfort and a secure operatingsSystem.
108
+
Therefore, the SUSE Linux Enterprise Server 12 standard security settings provide a good tradeoff between compatibility to all workloads, administrative comfort and a secure operating system.
109
109
110
110
SAP HANA is a very special workload with clearly defined requirements.
111
111
For such a workload, it is possible to have a more restrictive security configuration compared to the standard configuration.
@@ -1266,7 +1266,7 @@ This chapter lists content changes for this document since its first release.
1266
1266
- in section "Adjust sysctl variables to improve network security": Explanation for setting net.ipv4.conf.default.secure_redirects and net.ipv4.conf.all.secure_redirects corrected
1267
1267
- in section "Restrict sudo for normal users" tip for using `Default targetpw` corrected
1268
1268
- in section "Adjust default umask": tip about `pam_umask.so` added
1269
-
- in section "Set up password for single user mode": renamed single user mode more correctly to resuce mode
1269
+
- in section "Set up password for single user mode": renamed single user mode more correctly to rescue mode
1270
1270
- in "Adjust sysctl variables to improve network security": now recommends creating a file in `/etc/sysctl.d/` instead of changing `/etc/sysctl.conf`
1271
1271
- in section "Modify permissions on certain system files": correct some errors in permissions and usage
1272
1272
- in "SUSE Linux Enterprise Server Update Channels": reference to unavailable document 'SUSE Linux Enterprise Server Maintenance made simple' in resource-library removed
Copy file name to clipboardExpand all lines: adoc/OS_Security_Hardening_Guide_for_SAP_HANA_SLES15_SP2_and_later.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -376,7 +376,7 @@ Recommendation::
376
376
This is only a good strategy if important security updates are installed outside of the usual maintenance windows.
377
377
378
378
379
-
Selectively installating new updates and patches
379
+
Selectively installing new updates and patches
380
380
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
381
381
Description::
382
382
A selective installation of patches and updates, for example of security updates only, further reduces the probability of installing problematic updates.
0 commit comments