Product SiteDocumentation Site

Documentation 0.2


Information Technology Security Policies

Edition 1

Mike McGrath

Fedora Project Infrastructure

Legal Notice

Copyright © 2009 The Fedora Project This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at
This is the official security policy for The Fedora Project. Below is a list of chapters for consideration. End users (non engineers/admins) should go directly to reading chapter '3 - End User Security Introduction'.

1. CSI Introduction
1.1. Introduction
1.2. What to do
1.3. External Sources and References
2. Host Security Introduction
2.1. Prerequisites
2.2. Host General Security
2.2.1. Suggested /etc/sysctl.conf config
2.3. IPTables Configuration
2.3.1. Suggested /etc/sysconfig/iptables configuration
2.4. Host Security Categories
2.5. System Identification
2.5.1. System Identification Example
3. End User Security Introduction
3.1. End User Standards
3.1.1. Administrative Exceptions
3.2. Security Incidents
3.3. External Sources and References
4. Incident Response
4.1. Introduction
4.1.1. The Rules
4.1.2. Incident Response Team
4.1.3. Management
4.2. Prerequisite Tasks
4.3. Assessment and Communication
4.3.1. Management Chain Notification
4.3.2. Threat Assessment
4.3.3. Entry Investigation
4.3.4. Impact-Assessment
4.3.5. Partner Communication
4.3.6. Public Disclosure
4.4. Actions
4.4.1. Investigation
4.4.2. Data Integrity Plan
4.4.3. Re-secure Environment Plan
A. Revision History