Security Audit Report for ACME Corporation
|
|
|
- Robyn Fox
- 10 years ago
- Views:
Transcription
1 Security Audit Report for ACME Corporation Acme Security Audit 1
2 Table of Contents Acme Security Audit...3 Executive Summary...3 Security Architecture and Design...5 Network Security...7 Host Security...10 Linux/FreeBSD Host Security...10 Windows Host Security...13 Physical Security...18 Acme Security Audit 2
3 Acme Security Audit Executive Summary This report represents the final result of a security audit of the Acme web based systems. The audit was performed by examining the Acme security policy, taking a snapshot of the state of the systems, running a collection of analysis programs and staff discussions. The security audit examined all significant facets of the Acme.com network that would affect its security level, including host and network security, physical security, network services and finally the overall security architecture of the network. Major Issues We found security issues in several different areas of the Acme.com network. The most serious are the following: The first line of defense, the firewall, has been setup properly, but the second line of defense, server configuration is lacking in network services security, user account security, password policy and file system security. If an intruder breaches the firewall, the system offers little defense for server security There is no separation between the Web servers and the Database servers on the production network. If an attacker gains access to a Web server, he has full network access to the Database servers. A DMZ network zone needs to be established in order to achieve this separation The network servers on the DMZ network of the Acme corporate office are exposed to Internet traffic. This makes it very easy for an attacker to gain access to the servers. This vulnerability is compounded by the fact that the corporate servers have a direct pathway into the production network by means of a VPN tunnel. By taking over a corporate server, an attacker will have little difficulty in penetrating the production network Several IIS installations display severe security holes. An attacker can exploit vulnerabilities within the IIS servers and can potentially gain remote administrative access to the servers. Patches and advisories are available for these vulnerabilities Additional Issues While not critical, these issues should be resolved in the near future: Antivirus implementation has occurred after infection (of Nimda and Code Red worms/viruses). The result of this is that these worms/viruses install backdoor programs that open the possibility of hackers to have full remote access to the servers Auditing and intrusion detection processes need to be put into place so that the system administration staff is notified of break-in attempts and other security breaches. We recommend Acme Security Audit 3
4 using readily available tools such as portsentry, logcheck and tripwire in order to automate these processes Patch installation processes need to be put in place so that security patches and hotfixes are applied to the servers as soon as security alerts are published. We recommend running, on a periodical basis, patch inspection tools available from Microsoft. For Linux servers, RedHat also offers an automated patch update service. We also recommend that the system administration staff subscribe to automated notifications which contain security alerts and advisories from CERT and the SANS Institute Conclusion We have found several critical security inconsistencies in the Acme.com network that require immediate attention. The problems of the site are not insurmountable, and other than the DMZ zone setup within the production network, most of the issues can be resolved rapidly. Difficulties such as having numerous small problems on the individual hosts, as well as having some significant network issues indicate a general problem with allocating resources to solve basic security issues. The system staff is generally knowledgeable about security, but needs to spend more time on day-to-day system administrative tasks as well as achieving more consistency and order into the organization of the systems. We recommend the system staff to concentrate on the major issues fixing the configuration problems on the network and then methodically fixing all the host-based problems that were found. After the basic problems are resolved, the next effort should be focused on enforcing policy, updating documentation, and putting into place procedures and programs that would prevent security problems from recurring. Overall Ranking Overall Security Assessment (2.4 out of 5) * * * Security Architecture and Design * * Network Security * * Linux / FreeBSD Host Security * * * Windows Host Security * * Physical Security * * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Acme Security Audit 4
5 Security Architecture and Design Introduction This section discusses the overall layout of the system infrastructure of the Acme Web site, as well as the layout of the corporate network architecture. While not part of the production infrastructure, the corporate servers are very important from a security point of view because of the special trust relationships and patterns of access to the production servers. We have found significant security vulnerabilities in the corporate network infrastructure. We also discuss specific issues with the border router and the firewall which isolate the production network from general Internet network traffic. Security Architecture & Design Assessment * * Production Network Architecture at Colocation facility * * Border Router * * PIX Firewall Implementation * * * * Corporate Network Architecture * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o The Acme production infrastructure is hosted at a colocation facility o The Acme production infrastructure is protected by a robust firewall o The firewall has almost all ports closed, with the exception of HTTP and SSL traffic o IPSec is being used to access the production servers via client VPN software Weak points: o The network design of the production site is flat, with no separation between the Web servers and the Database servers o The border router does not implement proper access control list in order to prevent spoofing and denial of service attacks o The corporate network servers on the DMZ network are totally exposed to all Internet traffic o There is a strong trust relationship between the corporate servers on the DMZ network and the production servers -- the former are allowed VPN access into the latter. This is particularly dangerous because of the exposure of the corporate servers to all Internet traffic Acme Security Audit 5
6 Production Network Architecture at the data center There is no DMZ (De-Militarized Zone) on the production network firewall at the data center Consider setting up DMZ on firewall in order to isolate Web servers from Database servers; this prevents intruders to gain access to the Database servers even if they do gain access to the Web servers Border Router (SANS Top 20 Security Vulnerabilities) Set up rules against denial of service originating from production network o Allow only internal addresses to enter the router from the internal interfaces Set up rules against source routing Firewall Implementation Security Risk: Medium Do not allow incoming traffic over the Internet into the production network from unprotected servers at the corporate network; a VPN connection should be used instead o Traffic is currently allowed from several servers at the corporate network to ports 1433 (SQL Server) and 5631/5632 (PCAnywhere) on several production servers Corporate Network Architecture Set up DMZ properly o The current setup is to use the DMZ port on the NetScreen firewall in transparent mode, which effectively leaves all servers on the DMZ open to the world o Implement NAT and block all incoming traffic Acme Security Audit 6
7 Network Security Introduction This section discusses the security of the Acme production servers as it relates to services and applications visible from the network. It is particularly important to look at vulnerabilities related to Web servers and applications, since the firewall does not block HTTP traffic. It is also important to look at the network security of not only the production servers, but also of the corporate servers, since they are enjoying a strong trust relationship in terms of security with the production environment. We also look at common network services such as mail, DNS and NFS. Network Security Assessment * * Network Services * * Web Server Security * * Mail * DNS * * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o telnet and ftp access is disabled on the production servers o tcp_wrappers is installed on the production Linux servers, enabling enhanced logging capabilities o Unnecessary services are disabled on the production servers o DNS servers are up-to-date in terms of software versions and do not allow zone transfers; reverse DNS lookups do not reveal server names that might help an attacker in guessing the function of the servers o NFS is being used on only one production server and the NFS exports are restricted to a small number of servers Weak points: o All corporate servers on the DMZ network have a large number of open ports accessible by anybody on the Internet; the services running on these port numbers cover a large portion of the SANS Top 20 security vulnerabilities and can be easily exploited by attackers in order to gain full control over the servers o A simple network scan reveals Web servers running on non-standard port numbers, which can be used to gain access to valuable information (Compaq Management Server for example) Acme Security Audit 7
8 o Several IIS installations on the corporate network display severe security holes which can be used to gain access to the servers; some of these vulnerabilities have been discovered two years ago and patches are available o The corporate mail server allows relaying and can be used by spammers to send mail to third parties Network Services Disable RPC/portmapper on Linux/FreeBSD servers which do not need to run NFS (ns1, ns2, mail) (SANS Top 20 Security Vulnerabilities) Fix the NULL session bug on all Windows servers; this allows an attacker to connect to the IPC$ share over the network with blank user name and password and then to enumerate shares, users and groups on the servers. This can be fixed by blocking the NetBIOS ports at the border router or at the firewall (SANS Top 20 Security Vulnerabilities) Security Risk: Medium Disable rsh, rexec and the other r services on all Linux/FreeBSD servers (SANS Top 20 Security Vulnerabilities) Web Server Security Several IIS installations display severe security holes such as the MDAC RDS vulnerability (CVE entry CVE ), the Index Server Directory Traversal vulnerability (CVE entry CVE ) and various ISAPI filters and IIS/FrontPage extensions vulnerabilities (idq.dll, webhits.dll, etc.) (SANS Top 20 Security Vulnerabilities) Several production and corporate servers run the ColdFusion Administration server on publiclyaccessible IP addresses Mail mail.acme.com allows relaying o malicious users are able to send unsolicited mail to third parties using mail.acme.com as their SMTP server DNS Acme Security Audit 8
9 Security Risk: Medium Recursive queries are allowed against ns1.acme.com and ns2.acme.com. This may allow DNS cache poisoning attacks against the servers. Security Risk: Low Logging is not implemented; consider logging various aspects of DNS operations for easier auditing and monitoring Acme Security Audit 9
10 Host Security Linux/FreeBSD Host Security Introduction In this section we examine the overall security of the servers running Linux and FreeBSD. We looked at security settings and processes at the host and operating system level, such as user accounts and passwords, file systems, auditing and intrusion detection. Most of the Linux servers we looked at are running RedHat 7.1, which provides a fairly good security out of the box. We recommend upgrading all servers to RedHat 7.1 and running Linux-specific security hardening tools such as Bastille on a regular basis. Linux / FreeBSD Host Security Assessment * * * User Account and Password Policies * * File System Security * * * Services * * * Apache Security * * * * Auditing and Intrusion Detection * * Security Patches * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o File system security is generally strong o Services are well secured, with the exception of RPC services on some servers o Security for the Apache web server is generally strong o Syslog events are being sent from production servers to a central location o Process is in place for subscribing to Red Hat automated patch updates Weak points: o There is no enforcement of strong user passwords and no aging and expiration of passwords o There is no automated process in place for monitoring suspicious file permissions and ownership o There is no automated process in place for monitoring log files events o Security patches have not been applied recently Acme Security Audit 10
11 User Account and Password Policies Set password aging and expiration; currently no aging and expiration are set, in contradiction with the stated security policy Security Risk: Medium Use sudo to execute commands which require root privileges; sudo logs all commands, as opposed to su Security Risk: Low Set /bin/false as the default shell in /etc/passwd for system accounts (e.g. uucp, mail, news) File System Security Do not allow world-writable files, especially owned by root Security Risk: Low Look for suspicious SUID and SGID files Look for files with no real owner Write scripts to periodically monitor the file system for the file types listed above Services Disable any RPC services which are not necessary Apache Security Security Risk: Medium Consider running the httpd daemon with a user and group other than nobody, since nobody is treated in a special way on NFS servers and clients Acme Security Audit 11
12 Auditing and Intrusion Detection There currently is no auditing process in place; exploits are being tried against servers with no alerts being triggered All logs need to be monitored periodically The implementation of sending syslog events to a remote server is incorrect on ns1.acme.com; instead of syslog events being sent to the remote server, a file called messages?@loghost is being created Security Patches Periodically download relevant security patches from the vendor sites and apply them Acme Security Audit 12
13 Windows Host Security Introduction In this section we examine the overall security of the servers running Windows NT/2000. We examined the servers to make sure that a strategy is in place for keeping up to date on the latest security patches and virus definition files. User rights and file permissions were analyzed to make sure that appropriate permissions are being applied. Lastly, we examined the setup of IIS, ColdFusion, and SQL Server for security vulnerabilities. Windows Host Security Assessment * * User Account and Password Policies * File System Security * User Rights * * * Share Permissions * * * * * Auditing and Intrusion Detection * Antivirus * * Hotfixes/Patches * * IIS/ColdFusion * * SQL Server * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o Shared folders are generally administrative shares, and as such, are hidden from view o User Rights were generally well secured o NTFS permissions are set using groups instead of individual users o NTFS used for file partitions allowing for greater security and error recovery Weak points: o Auditing was incorrectly implemented resulting in no auditing being performed o Password Policies were incorrectly implemented resulting in Windows default Password Policies being applied o User accounts that were created with Administrator access to run critical processes (sqlexecservice) are currently being used to logon to the network o Most directories are setup with Everyone Full Control access Acme Security Audit 13
14 o Spotty implementation of security patches o Several servers infected with viruses including CodeRed II and Nimda User Account and Password Policies Account Policies were setup incorrectly by using Domain Controller Security Policy instead of using Domain Security Policy. The Account Policies that were setup using the Domain Controller Security Policy window were overridden by the default values provided in the Domain Security Policy window. As a result, the only Account Policies that are in affect are the default Account Policies setup by Windows when it is first installed, which are very weak o No minimum password length required o No minimum/maximum password age o No password complexity requirements o No lockout after unsuccessful logon attempts Most passwords are setup to never expire. Most user accounts should be setup so that their passwords expire on a regular basis Security Risk: Medium Administrator and Guest accounts should be renamed. If the Administrator and Guest accounts are renamed, it makes it more difficult for a hacker to gain unauthorized access into the network. Not only should this be done for the domain Administrator and Guests Accounts, but should also be done for the local Administrator and Guest accounts Security Risk: Low The same password is being used for the local Administrator account on multiple Member Servers. User will not be prompted for password while accessing another server that has the same password when logged on using the Administrator account. This allows the user access to resources on multiple computers with only having to logon once The logon screen shows the last user logged on to the system. This gives a hacker a valid user name. Now all the hacker needs to do is to attempt to hack the password to gain access to the system The screen saver should be configured to password protect the screen after a number of minutes of inactivity. If the user forgets to logoff or lock the terminal, it will be done automatically after a number of minutes of inactivity Acme Security Audit 14
15 File System Security (SANS Top 20 Security Vulnerabilities) Everyone Group has Full Control on most directories (Windows default). Change to appropriate permissions User Rights Security Risk: Medium Tighten permission on the following User Account policies: Auditing and Intrusion Detection (SANS Top 20 Security Vulnerabilities) On the Domain Controller, Auditing Policies were setup incorrectly by using Local Security Policy instead of using Domain Controller Security Policy. The Local Security Policies that were setup were overridden by the values provided in the Domain Controller Security Policy window. The Domain Controller Security Policies specified that no auditing was to be performed Event Logs are not being checked for security breaches. If they were being checked, the incorrectly configured Auditing Policies listed above would have been discovered Security Risk: Medium Event Logs on some servers are only being kept for seven days. If a prolonged security breach takes place, critical log data used analyze the extent of the breach will be lost Security Risk: Low Implement a warning logon message to warn intruders that Acme will prosecute unauthorized access attempts Antivirus Antivirus software needs to be installed on all Windows servers on the network. Some Windows servers had no antivirus software installed Of the servers that did have antivirus software installed, the antivirus software should be configured to download antivirus definitions on a more frequent basis. The current configuration downloads new virus definitions once a week. Since new viruses come out every day, it is advisable that definitions be downloaded everyday Acme Security Audit 15
16 Some production servers are currently infected (or have been infected in the past) with the Nimda and CodeRed II viruses. A Trojan program (Trojan.VirtualRoot) has been installed on these servers that can allow a hacker to have full remote access to these servers by issuing a HTTP GET request to run scripts\root.exe on the infected web server. It is recommended that a CodeRed removal tool be run against these servers. Once a computer has been attacked by W32.Nimda.A@mm, it is possible that your system has been accessed remotely by an unauthorized user. For this reason, it is impossible to guarantee the integrity of a system that has had such an infection. If you need to be certain that your organization is secure, you must reinstall the operating system, and restore files from a backup that was made before the infection took place, and change all passwords that may have been on the infected computers or that were accessible from it. This is the only way to ensure that your systems are safe Hotfixes/Patches Windows hotfixes/patches have not been applied equally across all servers in the network. While some servers were up to date with the latest patches, some servers were very far behind. We recommend that Acme download the latest version of HFNETCHK.EXE from the Microsoft web site. When run this tool tells you which hotfixes/patches are missing from a server or workstation IIS/ColdFusion (SANS Top 20 Security Vulnerabilities) Setup appropriate permissions on inetpub, wwwroot, ftproot, and script directories. On most of the servers, users were given too much access permissions to these directories because permissions were set to Everyone Full Control Setup appropriate permissions on Consumer, Corporate, and Admin WWW directories. Users were given too much access permissions to these directories because permissions were set to Everyone Full Control SQL Server Security Risk: Medium Any user in the local Admin group has complete access into SQL server. Remove all users within the local Admin group that do not need local Admin rights, or remove the BUILTIN\Administrators group from SQL Server. Acme Security Audit 16
17 Miscellaneous Items Only one Domain Controller exists in the domain. Active Directory security information gets distributed to all domain controllers in the domain. With only one domain controller, there is no redundancy for this information Security Risk: Medium Unnecessary services should be turned off. Each network service you run has the potential to open unknown and unprotected security holes. Additionally, they may be useful in helping an intruder attack other parts of the system Security Risk: Low Emergency Repair Disks are not being generated on a frequent basis. On some servers this has not been done in over a year. Without updated Emergency Repair Disks, it makes disaster recovery more difficult Acme Security Audit 17
18 Physical Security Introduction This section discusses the physical security of the Acme production servers. We looked at the security of the data center where the production servers are collocated, at the physical security of the servers themselves, and also at the disaster recovery procedures in place for the Acme production infrastructure. Physical Security Assessment * * * Colocation Facility Security * * * * Computer Security * * * Disaster Recovery * * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o The production servers are hosted at the Acme data center in downtown Los Angeles o The servers are locked in cabinets with combination locks o Backups are being done for the Windows servers and the backup tapes are stored off-site Weak points: o Users are not logging off or locking the screen when using PCAnywhere to access the Windows servers o The production Linux servers are not being backed up Computer Security Users are not logging off from the console when they are done working on the server. If a malicious user gets past the PCAnywhere login, he has full access to the server desktop. Acme should consider implementing a User Policy that logs off users after a number of minutes of inactivity Acme Security Audit 18
19 Security Risk: Medium CMOS/BIOS access is not password-protected on Linux and Windows servers LILO is not password protected on Linux; a user with physical access to the console can boot in single-user mode and gain root access Security Risk: Low Consider disabling the CTRL-ALT-DEL combination on Linux servers to prevent users from rebooting the servers Disaster Recovery The production Linux servers are not being backed up Acme Security Audit 19
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers
The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers University of California, Riverside Computing and Communications Author: Joel Nylander Document Goal This document
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2
Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Activity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3
FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3
Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3 page 3 Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3 This document describes how to setup and configure Alteon
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Where can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
Managing Remote Access
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
Microsoft Baseline Security Analyzer
The (MBSA) checks computers running Microsoft Windows Server 2008 R2 for common security misconfigurations. The following are the scanning options selected for Cisco Unified ICM Real-Time Distributor running
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
GFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Rapid Vulnerability Assessment Report
White Paper Rapid Vulnerability Assessment Report Table of Contents Executive Summary... Page 1 Characteristics of the Associated Business Corporation Network... Page 2 Recommendations for Improving Security...
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Data Stored on a Windows Server Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
