Thanks to Julian
Coombes for this link.
“Organizations throughout the world are adopting Linux as their
production platform. By connecting to the Internet to provide
critical services, they also become targets of opportunity. To help
protect these Linux systems, this article covers the basics of
securing a Linux box. The examples provided here are based on Red
Hat 5.x, but should apply to most Linux distributions.”
Read Armoring
Linux.