Server Controls

Medium Level Server Controls

  1. Are all servers supporting the application protected by a firewall from the untrusted network? If no, the server has low level security controls and this must be remedied.
  2. What filesystem type is being used (FAT, NTFS, EXT2)? The file system must support system access controls or the server has low level security controls and this must be remedied. FAT file systems have no security controls.
  3. Is the data stored on a different server than the webserver? If no, the server has low level security controls.
  4. Is the application and database server for the project in a more secure network zone than the web server? If no, the server has low level security controls.
  5. Are servers regularly updated according to the system update policy? If no, the server has low level security controls.
  6. What physical security is provided? Visitors must be escorted and access must be logged or the server has low level security controls.
    1. Are visitors escorted?
    2. Is the server room locked?
    3. Does a sign in/sign out procedure exist?
    4. Is facility access activity logged or recorded?
  7. Do you have a server hardening process in place? Includes:
    1. Turning off all unnecessary services.
    2. Patching the system regularly and is it currently including the latest patches?
    3. Configure file, directory, and registry settings to allow for appropriate minimum rights to the file system, directory services, and the registry. The application should have the minimum rights required.
    4. Configure logging to provide information about any security breaches or attacks.
    5. System security policies should be in place including auditing policies, system password, and account passwords including settings detailing minimum lengths, complexity rules, and change frequency.
    6. Installation of software necessary for use on the system including network protocols - minimum installation.
    If no, the server has low level security controls.
  8. Is the system operating with antivirus software updated and running?
  9. The system is backed up daily?
  10. The system is tested at least once monthly to be sure recovery of lost data can be performed.
  11. All users on the system have their own unique accounts and accounts are not shared by users.
  12. The system supports password policies for password complexity, limit of bad logins, and account lockout policies.
  13. The system is checked daily for hard drive space and server logs are checked.
  14. Are user activities logged and reviewed on the system?
  15. Someone is responsible for the security of the system.
  16. Is host based intrusion detection installed and operating? Monitor the following areas:
    1. Log/event - Defines a process that watches system and application logs for significant security events.
    2. File integrity - A process that watches key system and application files for unauthorized changes made to them.
    3. Network traffic monitor - Monitors and controls network traffic coming into the protected hosts looking for traffic that violates security policies or represents a security incident.
    4. System monitor - Monitors the system for overall performance and stability. Watches for rogue unauthorized processes that an attacker might attempt to run.
    5. Policy compliance - Verifies system configuration to validate that it conforms to defined organizational policies and checks to make sure that changes that violate policy have not been performed on the system.
  17. Is there a server auditing process to ensure security controls are implemented, updates are in place, and monitoring is done properly?
  18. Are system and services configuration settings reviewed by one or more peers at setup and periodically thereafter?