Introduction
In system administration and cybersecurity, a security baseline is a standardized level of minimum security configuration for a system or network. Establishing baselines is a fundamental step in hardening systems, reducing the attack surface, and ensuring a consistent security posture across an organization. Compliance controls are the mechanisms and procedures used to verify that these baselines are being met and maintained.
In this lab, you will get hands-on experience with these concepts on a Linux system. You will learn how to define a simple security baseline for new user accounts, verify that the baseline is correctly applied, and configure the Linux Audit Daemon (auditd) to monitor critical configuration files for unauthorized changes. This process is crucial for maintaining system integrity and meeting regulatory compliance requirements.
By the end of this lab, you will be able to:
- Modify system-wide user default settings.
- Create new users that adhere to a defined security baseline.
- Verify compliance using standard Linux commands.
- Configure
auditdto watch for changes to critical files. - Search and review audit logs for security events.



