Major customers deploying Linux have surprisingly consistent approaches to how they deal with security. This talk gives an overview of customer security approaches, the challenges and constraints they face, how they use various Linux security capabilities, and common requests. We will address core customer needs and expectations and map them back to implications for Red Hat.
Traditional security software is only one part of the solution. We will show how to address these customer needs through an integrated approach based on risk analysis and risk mitigation that includes software, business processes, policies, procedures, and people.