In this session we are going to show you how easy it can be to raise the security of your system using readily available technologies. We will guide you through it via a presentation and demos which will enable you to set up an environment capable of allowing users to do certain administrative actions, rejecting unwanted usb devices or allowing only trusted application to be executed, automatically unlocking encrypted drives at boot time under specific conditions or collecting system logs centrally over a secure channel. We are also going to shed some light on the efforts we devote to keeping and even improving the level of quality RHEL is known for.