
I appreciate the strong security features of CIS Red Hat Enterprise Linux, particularly how it revokes all access to non-root users. This significantly enhances the security by ensuring that unauthorized personnel cannot execute commands that could compromise the system. I also value the partition-level security it provides, such as setting 'noexec' and 'nosuid' options in the 'fstab' file for temporary partitions. This feature effectively prevents the automatic execution of programs, adding an additional layer of security to protect sensitive data. Moreover, the restrictions set for '/etc/fstab' are particularly beneficial for temporary partitions, which are often targeted by applications looking to execute programs. By disallowing execution on these partitions, it minimizes security risks and protects our telecom customers' environments more efficiently. Review collected by and hosted on G2.com.
I find handling the PAM authentication and audit services in CIS Red Hat Enterprise Linux to be quite confusing. While PAM is essential for Linux password restrictions, the complexity involved makes it cumbersome, and managing the necessary controls could be streamlined if handled separately. Additionally, the initial setup of the system is challenging due to numerous restrictions that must be kept in mind. This adds another layer of complexity, requiring careful application of changes or modifications, which reduces the overall user-friendliness. Review collected by and hosted on G2.com.
Validated through a trusted API Partner
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.


