S

Initial Steps to Secure Rocky Linux 8

This guide describes some best security practices for a new Rocky Linux server. You'll learn how to: * Use an SSH key * Create a new standard user account and grant it sudo privileges * Disable SSH access for the root user * Change the default SSH port * Disable firewall [zone drifting](https://firewalld.org/2020/01/allowzonedrifting) You should have a local workstation with OpenSSH installed like Windows 10 or higher, macOS, or Linux. If you don't have an SSH key, you should [creat......

Comments