Skip to content

Commit c11b932

Browse files
authored
Merge pull request #51 from kolkhis/add-unit3-worksheet
feat: Add unit 3 worksheet
2 parents 1282644 + f8871c1 commit c11b932

3 files changed

Lines changed: 193 additions & 1 deletion

File tree

133 KB
Binary file not shown.
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
ProLUG Security Engineering
2+
Unit 3 Worksheet
3+
4+
Instructions
5+
Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until
6+
the end to turn them in as a final submission packet.
7+
8+
Discussion Questions:
9+
10+
Unit 3 Discussion Post 1: There are 16 Stigs that involve PAM for RHEL 9. Read the guide
11+
from Rocky Linux here: https://docs.rockylinux.org/guides/security/pam/
12+
1. What are the mechanisms and how do they affect PAM functionality?
13+
a. Review /etc/pam.d/sshd on a Linux system, what is happening in that file
14+
relative to these functionalities?
15+
16+
2. What are the common PAM modules?
17+
a. Review /etc/pam.d/sshd on a Linux system, what is happening in that file
18+
relative to these functionalities?
19+
20+
3. Look for a blog post or article about PAM that discusses real world application. Post
21+
it here and give us a quick synopsis. (Bonus arbitrary points if you find one of our
22+
ProLUG members blogs on the subject.)
23+
24+
Unit 3 Discussion Post 2: Read about active directory (or LDAP) configurations of Linux via
25+
sssd here:
26+
https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/
27+
1. Why do we not want to just use local authentication in Linux? Or really any system?
28+
2. There are 4 SSSD STIGS.
29+
a. What are they?
30+
b. What do they seek to do with the system?
31+
32+
Definitions/Terminology
33+
34+
PAM
35+
36+
AD
37+
38+
LDAP
39+
40+
sssd
41+
42+
oddjob
43+
44+
krb5
45+
46+
realm/realmd
47+
48+
wheel (system group in RHEL)
49+
50+
Notes During Lecture/Class:
51+
52+
Links:
53+
- https://www.sans.org/information-security-policy/
54+
- https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
55+
- https://docs.rockylinux.org/guides/security/pam/
56+
- https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/
57+
- https://docs.rockylinux.org/books/admin_guide/06-users/
58+
59+
Terms:
60+
Useful tools:
61+
- STIG Viewer 2.18
62+
- SCC Tool (version varies by type of scan)
63+
- OpenScap
64+
Lab and Assignment
65+
Unit3_Identity_and_Access_Management - To be completed outside of lecture time.
66+
Digging Deeper
67+
68+
1. How does /etc/security/access.conf come into play with pam_access? Read up on it
69+
here: https://man7.org/linux/man-pages/man8/pam_access.8.html
70+
a. Can you find any other good resources?
71+
b. What is the structure of the access.conf file directives?
72+
2. What other important user access or user management information do you learn by
73+
reading this? https://docs.rockylinux.org/books/admin_guide/06-users/
74+
a. What is the contents of the /etc/login.defs file? Why do you care?
75+
76+
Reflection Questions
77+
78+
1. What questions do you still have about this week?
79+
2. How are you going to use what you’ve learned in your current role?

src/u3ws.md

Lines changed: 114 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,119 @@
11
<div class="flex-container">
22
<img src="https://github.com/ProfessionalLinuxUsersGroup/img/blob/main/Assets/Logos/ProLUG_Round_Transparent_LOGO.png?raw=true" width="64" height="64"></img>
33
<p>
4-
<h1>Under Construction</h1>
4+
<h1>Unit 2 Worksheet - Securing the Network Connection</h1>
55
</p>
66
</div>
7+
8+
## Instructions
9+
10+
---
11+
12+
Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until
13+
the end to turn them in as a final submission packet.
14+
15+
### Resources / Important Links
16+
17+
- <https://www.sans.org/information-security-policy/>
18+
- <https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/>
19+
- <https://docs.rockylinux.org/guides/security/pam/>
20+
- <https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication/>
21+
- <https://docs.rockylinux.org/books/admin_guide/06-users/>
22+
23+
#### Downloads
24+
25+
The worksheet has been provided below. The document(s) can be transposed to
26+
the desired format so long as the content is preserved. For example, the `.txt`
27+
could be transposed to a `.md` file.
28+
29+
- <a href="./assets/downloads/u3/u3_worksheet.pdf" target="_blank" download>📥 u3_worksheet(`.pdf`)</a>
30+
- <a href="./assets/downloads/u3/u3_worksheet.txt" target="_blank" download>📥 u3_worksheet(`.txt`)</a>
31+
<!-- - <a href="./assets/downloads/u3/u3_worksheet.docx" target="_blank" download>📥 u3_worksheet(`.docx`)</a> -->
32+
33+
### Unit 2 Recording
34+
35+
<img src="./assets/images/under-construction.jpg" style="border-radius:2%"></img>
36+
37+
<!-- <iframe -->
38+
<!-- style="width: 100%; height: 100%; border: none; -->
39+
<!-- aspect-ratio: 16/9; border-radius: 1rem; background:black" -->
40+
<!-- src="" -->
41+
<!-- title="" -->
42+
<!-- frameborder="0" -->
43+
<!-- allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" -->
44+
<!-- referrerpolicy="strict-origin-when-cross-origin" -->
45+
<!-- allowfullscreen> -->
46+
<!-- </iframe> -->
47+
48+
#### Discussion Post #1
49+
50+
There are 16 Stigs that involve PAM for RHEL 9.
51+
Read the guide from Rocky Linux here: <https://docs.rockylinux.org/guides/security/pam/>
52+
53+
1. What are the mechanisms and how do they affect PAM functionality?
54+
- Review `/etc/pam.d/sshd` on a Linux system.
55+
What is happening in that file relative to these functionalities?
56+
2. What are the common PAM modules?
57+
- Review `/etc/pam.d/sshd` on a Linux system.
58+
What is happening in that file relative to these functionalities?
59+
3. Look for a blog post or article about PAM that discusses real world application.
60+
Post it here and give us a quick synopsis. (Bonus arbitrary points if you find one of our ProLUG members blogs on the subject.)
61+
62+
#### Discussion Post #2
63+
64+
Read about active directory (or LDAP) configurations of Linux via `sssd` here:
65+
<https://docs.rockylinux.org/guides/security/authentication/active_directory_authentication>
66+
67+
1. Why do we not want to just use local authentication in Linux? Or really any system?
68+
2. There are 4 SSSD STIGS.
69+
- What are they?
70+
- What do they seek to do with the system?
71+
72+
<div class="warning">
73+
Submit your input by following the link below.
74+
75+
The discussion posts are done in Discord threads. Click the 'Threads' icon on the top right and search for the discussion post.
76+
77+
</div>
78+
79+
- [Link to Discussion Posts](https://discord.com/channels/611027490848374811/1098309490681598072)
80+
81+
## Definitions
82+
83+
---
84+
85+
PAM:
86+
87+
AD:
88+
89+
LDAP:
90+
91+
sssd:
92+
93+
oddjob:
94+
95+
krb5:
96+
97+
realm/realmd:
98+
99+
wheel (system group in RHEL):
100+
101+
## Digging Deeper
102+
103+
---
104+
105+
1. How does `/etc/security/access.conf` come into play with pam_access?
106+
Read up on it here: <https://man7.org/linux/man-pages/man8/pam_access.8.html>
107+
- Can you find any other good resources?
108+
- What is the structure of the access.conf file directives?
109+
2. What other important user access or user management information do you learn by
110+
reading this? <https://docs.rockylinux.org/books/admin_guide/06-users/>
111+
- What is the contents of the `/etc/login.defs` file? Why do you care?
112+
113+
## Reflection Questions
114+
115+
---
116+
117+
1. What questions do you still have about this week?
118+
119+
2. How are you going to use what you've learned in your current role?

0 commit comments

Comments
 (0)