Technical requirements
For the hands-on exercises in this chapter, you will need two RHEL 9.4 (or newer) machines (physical or virtual) both will be clean installations. We will do one of those installations together as an exercise.
To achieve this, you will need access to a Red Hat® account (developer or production), installation media, Fedora® Media Writer, and the ability to install/reinstall the operating system on the two machines.
Additionally, you will need the ability to download and install additional packages from third-party or government websites. The STIG Viewer tool can be installed on Windows® or Linux systems. You’ll need this as well, but it does not have to be installed specifically on your lab machines. Check out the book’s GitHub repository for helpful links: https://github.com/PacktPublishing/The-Embedded-Linux-Security-Handbook/blob/main/Chapter11/Resource_Cheat_Sheet.pdf.
Let’s move on to the reason why adherence to...