Chapter 8: RHEL OS security hardening


What options do I have for RHEL sudoers configuration?