Sles12: https://www.suse.com/documentation/sles-12/book_security/?page=/documentation/sles-12/book_security/data/book_security.html

Sles9-10-11: http://www.novell.com/support/kb/doc.php?id=7001

RedHat:

http://linux-audit.com/hardening-guides-tools-red-hat-linux-rhel/

https://www.google.ie/url?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwid-ufSndHJAhWBthQKHR1OAL8QFggcMAA&url=https%3A%2F%2Faccess.redhat.com%2Fdocumentation%2Fen-US%2FRed_Hat_Enterprise_Linux%2F6%2Fpdf%2FSecurity_Guide%2FRed_Hat_Enterprise_Linux-6-Security_Guide-en-US.pdf&usg=AFQjCNEAgVzuaFFjY8s3c3MbBGNalUsDXQ

——————————————— Technical resources —————————————————–

Linux security Tools:

http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html

Syslog:

http://www.novell.com/coolsolutions/feature/18044.html

http://doc.ubuntu-fr.org/syslog-ng

Tcp wrappers:

http://foralllinux.blogspot.fr/2011/02/tcp-wrappers-securing-linux.html

https://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-tcpwrappers.html

Ip tables:

https://www.suse.com/communities/blog/basic-iptables-tutorial/

https://www.nbs-system.com/blog/howto-iptables.html

SSH:

http://www.cyberciti.biz/faq/how-to-set-up-ssh-keys-on-linux-unix/

https://www.suse.com/communities/blog/ssh-secure-shell-tricks/

Xinetd:

http://lea-linux.org/documentations/Xinetd