Chapter 1. Securing RHEL during installation