Red Hat Enterprise Linux (RHEL) EVENT - Summit24 - Security Features
What is your assessment of RHEL’s built-in security features when it comes to: A) Risk reduction B) Business continuity C) Maintaining compliance?
Red Hat Enterprise Linux's built-in security features are good when it comes to risk reduction, business continuity, and maintaining compliance. We use Red Hat Satellite to manage our Linux. That makes it all very simple. There is a feature called OpenSCAP. We use it for security scanning. All the features that they provide on top of the base OS make it very easy to manage.
View full review »I feel the built-in features of Red Hat Enterprise Linux (RHEL) for risk reduction, business continuity, and maintaining compliance are very important because our company is always aware of all these security issues that constantly happen.
View full review »I would say that we use VMware for risk reduction so that we have a high availability...For business continuity, my company uses VMware, considering the ease of making snapshots of our environments, but I believe we could probably do the same with different operating systems.
View full review »My company prefers Red Hat Enterprise Linux (RHEL) because of its stability, patch management, and other features that make us feel more secure.
View full review »FB
Frank Brand
Server Automation Administrator at a financial services firm with 10,001+ employees
Considering the built-in security features offered by the tool for risk reduction, business continuity, and maintaining compliance, I prefer Red Hat Enterprise Linux (RHEL) over a lot of other products.
View full review »I would say it is very easy to patch, which helps our company to keep it up to date and avoid all downfalls.
View full review »Red Hat Enterprise Linux's built-in security features do a really good job of risk reduction, business continuity, and maintaining compliance.
View full review »Based on my assessment of the tool's built-in security features when it comes to areas like risk reduction, business continuity, and compliance, I would say that I am a big fan of the tool.
View full review »For security, SELinux is built in. It is out of the box. It is built towards building a secure system. We are in the process of working on compliance and getting this 800-171 certified. That is in process. They have regular security updates and lots of tools for rolling out updates. In that sense, there is a continuous upgrade path that is well-worn and fairly easy to maintain.
View full review »It inherently has a lot of things built in for risk reduction, business continuity, and maintaining compliance. For example, it has SELinux, certain firewalls, logging, and all those things. It has all the built-in features required to meet the needs. We can plug in other third-party tools to have it gather information, or we can send logs to centralized locations to track activity and do audits and things like that.
View full review »We had a situation where we had to create an image for Red Hat Enterprise Linux 9, and there were built-in playbooks for hardening the system. We were able to run that and create the image. It made the work much easier than it used to be in the past.
View full review »MV
Marcel Van Krieken
Support Engineer at Alcadis
We are satisfied with Red Hat's built-in security features, which effectively reduce risk, ensure business continuity, and maintain compliance. Red Hat Enterprise Linux provides a more secure operating system than other Linux solutions due to its robust security features and a supported kernel that receives regular security updates.
View full review »Red Hat Enterprise Linux's support and broad community assistance minimize the effort required to reduce risk, maintain business continuity, and ensure compliance.
View full review »Red Hat Enterprise Linux has robust built-in security features that effectively contribute to risk reduction, business continuity, and compliance maintenance. Red Hat demonstrates a solid commitment to security by providing timely updates and fixes to its customers. While the operating system itself is secure, it's important to note that Red Hat Enterprise Linux provides a foundational image that requires further hardening through the implementation of security controls. Red Hat empowers users with a platform and a range of hardening options, enabling them to tailor security measures to their specific application needs. Furthermore, Red Hat's rapid release of fixes and updates, often within a day or two of a vulnerability discovery, ensures that customers have access to the latest security enhancements.
View full review »MC
Matej Curcic
Consultant automation engineer at a computer software company with 501-1,000 employees
Red Hat Enterprise Linux is lauded for its robust security, though its strictness can tempt automation engineers to temporarily disable certain measures for specific tasks, potentially leading to oversights in reactivating them. While these stringent security protocols can pose challenges for some users, they ultimately enhance the overall reliability and stability of Red Hat Enterprise Linux systems and their applications, making them a worthwhile trade-off.
View full review »We chose Red Hat Enterprise Linux for our environment due to its robust built-in security features, including proactive security fixes and an enterprise-class operating system with reliable support services that enhance security and reduce risk. Furthermore, the secure base OS Docker image strengthens our environment's overall security posture.
View full review »Red Hat Enterprise Linux offers robust built-in security features.
View full review »Red Hat Enterprise Linux has robust built-in security features that effectively reduce risk in our environment.
View full review »Red Hat Enterprise Linux provides a stable and secure platform, which helps reduce risk in our environment.
View full review »Red Hat Enterprise Linux's built-in security features are great. We have never had a security breach in our Red Hat environment and receive monthly updates.
View full review »AH
reviewer0927345
Senior Solution Designer at a comms service provider with 1,001-5,000 employees
Red Hat Enterprise Linux's built-in security features satisfy our security requirements.
View full review »RB
Rick Beijn
System Engineer at Xifeo ICT
Red Hat Enterprise Linux helps us reduce risks in our environment through operating system patches. In my previous job, we ran baselines through Ansible to ensure every server was compliant with the company's standards based on CIS standards.
View full review »We use the Linux security heavily. I'm unfamiliar with the new security stuff incorporated in RHEL, but SELinux and all the security features are good. It doesn't particularly reduce risks, but there are some added layers of security for internet-facing applications we like.
View full review »Red Hat Enterprise Linux has built-in security features that can be automated. We must gather all the relevant policies and incorporate them into our automation scripts to apply them to the operating system.
View full review »TP
Tommi Pasto
App group manager at a comms service provider with 201-500 employees
Red Hat Enterprise Linux has robust built-in security features.
View full review »We extensively use Red Hat Enterprise Linux's built-in security features because they are excellent.
View full review »I appreciate the robust security features in Red Hat Enterprise Linux, such as including security benchmarks like CIS security hardenings. These benchmarks offer a significant improvement over previous Red Hat Enterprise Linux versions and provide numerous valuable security enhancements.
View full review »Red Hat Enterprise Linux offers robust built-in security features that surpass those found in Windows. Its highly customizable environment allows for easy system hardening, eliminating the need for additional purchases as all necessary security components are integrated within the operating system.
View full review »We rely on Red Hat Enterprise Linux for its built-in security features, timely support, and rapid release of the latest patches and updates.
View full review »Red Hat Enterprise Linux's built-in security features enhance some of our existing functionalities.
View full review »TL
Tobias Larsson
Datacenter System specialist at a manufacturing company with 201-500 employees
Red Hat Enterprise Linux's built-in security features work well.
View full review »Red Hat Enterprise Linux's built-in security features are great.
View full review »JD
Jo De Troy
Senior System Engineer at a comms service provider with 1,001-5,000 employees
While RHEL's built-in security features are excellent, we don't use all of them. It has many available capabilities, but it's not always up to the infrastructure people to decide what to use for security.
View full review »Red Hat is based on Linux, so the security is more stable than in other systems. For instance, we cannot reuse machine credentials. We use key certificates to connect to the machine. It's not like a user password. Without a key to access the machine, you cannot do anything. There are specific controls on user access, and you can limit the privileges.
View full review »I have mixed feelings about the built-in security features. SELinux must be configured correctly for the port and directory, or applications won't run, so we primarily disable it. Sometimes, we enable it and tinker with legacy systems deployed long before I joined the company. However, chances are it will break something if you enable it.
View full review »It has some of the best out-of-the-box security features of any Linux distributor. RHEL has more built-in security features than most standard flavors, or it has implemented them better.
View full review »BM
Bob Mulumba
Technical Consultant at a manufacturing company with 10,001+ employees
RHEL's security features have room for improvement, especially for highly regulated industries like health care. That's why it isn't the primary OS in health care. It would be great if they added some features to address the specific challenges health care providers face.
View full review »SC
Sitakanta Chaudhury
Cloud Infrastructure Architect at a healthcare company with 10,001+ employees
In addition to Linux's built-in security tools, it has RHEL configuration features that provide robust security controls. We also have third-party solutions that provide more in-depth solutions for our cloud and on-premises infrastructure. We have to provide security at each layer of the OSI models. For example, on the application layer, we have to provide web solutions or application gateways, but it provides good security features for the OS layer.
View full review »RHEL has good security features, so it's harder to breach than Windows. There's also a large RHEL user community, so when I get stuck, I can go to Stack Overflow or other user forums and get help. I typically get a solution within a few hours when I post a question.
View full review »