Author Archives: Russell Doty

Unknown's avatar

About Russell Doty

A technology strategist and product manager at Red Hat, working on the next generation of open source systems.

Availability of OpenLMI in Various Linux Distributions

A quick update on the availability of OpenLMI: I have tested Fedora, RHEL, CentOS, and OEL servers using the LMI CLI running on a Fedora system – the cross platform access works. Fedora Fedora is the primary development platform for … Continue reading

Posted in System Management | 2 Comments

LISA’14 – Are We Making Linux Too Easy?

LISA’14, the Large Installation System Administration conference, was held in Seattle last week. I had the opportunity to give a talk on Server Management – if you are interested, the slides are available here. One of the questions caught me … Continue reading

Posted in System Management | 8 Comments

Automation – a Security Imperative

The last post concluded with the cry “there has to be a better way!”. So far we have established: Security Guides are a good idea and exist in almost all organizations. Security audits are good and widely used. Security guides … Continue reading

Posted in Security | Leave a comment

System Audits – There Has to be a Better Way!

The last post laid out guidelines for a security guide. We’re now at the point where we can discuss a system audit. We have defined what an audit is, what security requirements are, and what a security guide is. At … Continue reading

Posted in Security | Leave a comment

High Level Requirements for a Security Guide

The previous post explored the kinds of information that might be in a security guide. Let’s lay out some basic requirements for a security guide: The security guide must exist. It must be available, updated, and maintained. The security guide … Continue reading

Posted in Security | Leave a comment

What is a Security Guide?

The last article introduced the concept of a security guide – but what is it? In many cases a security guide is a binder full of often vague, occasionally overly specific and sometimes conflicting requirements. It has usually grown and … Continue reading

Posted in Security | 2 Comments

Security Specifications

The previous article introduced security audits, which are actually audits of security specifications. There are many potential sources for security specifications. Some of them are government standards. For example, in the United States, HIPAA, the Health Insurance Portability and Accountability … Continue reading

Posted in Security | 1 Comment

Computer Security Audits

In conversations with large companies and small companies, literature review and looking at best practices for security, one of the most common tools that essentially everyone uses is a security audit. In most cases the security audit is performed regularly … Continue reading

Posted in Security | Leave a comment

LISA14 – Simplified Remote Management of Linux Servers

I am giving a talk on Simplified Remote Management of Linux Servers at the upcoming LISA14 conference in Seattle, which runs from November 9-14. My talk is 9:45-10:30am on Friday, November 14. LISA is Large Installation System Administration SIG of … Continue reading

Posted in System Management | Leave a comment

Yellow Sticky of Doom in the Cloud

The password managers we discussed in the last post are a good start. If you only use one system a local password database is all you need. Most people have multiple “devices” – a PC, a laptop, a smartphone, a … Continue reading

Posted in Security | 2 Comments