Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • set up appropriate new linux users
    • Password & Access security
    • use of public/private keys
  • limit root access
  • use sudo as needed
  • provide file system security
    • umask settings
    • setting up appropriate file permissions
Tests

...

Test the following application/server connection pairs via SSH tunnel

...