Security Audit Report for ACME Corporation



Similar documents
Network and Host-based Vulnerability Assessment

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Locking down a Hitachi ID Suite server

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Windows Operating Systems. Basic Security

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Payment Card Industry (PCI) Data Security Standard

SonicWALL PCI 1.1 Implementation Guide

GFI White Paper PCI-DSS compliance and GFI Software products

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

31 Ways To Make Your Computer System More Secure

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers

March

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Security Best Practice

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

My FreeScan Vulnerabilities Report

PCI Security Scan Procedures. Version 1.0 December 2004

74% 96 Action Items. Compliance

The Self-Hack Audit Stephen James Payoff

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Nixu SNS Security White Paper May 2007 Version 1.2

A Roadmap for Securing IIS 5.0

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Network Security and Firewall 1

Global Partner Management Notice

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

CMPT 471 Networking II

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Web Plus Security Features and Recommendations

IBM. Vulnerability scanning and best practices

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Recommended IP Telephony Architecture

Cisco Secure PIX Firewall with Two Routers Configuration Example

Web App Security Audit Services

Best Practices for DanPac Express Cyber Security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Activity 1: Scanning with Windows Defender

PROFESSIONAL SECURITY SYSTEMS

RL Solutions Hosting Service Level Agreement

System Security Policy Management: Advanced Audit Tasks

A Decision Maker s Guide to Securing an IT Infrastructure

PC Security and Maintenance

Retention & Destruction

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3

Web Security School Final Exam

Where can I install GFI EventsManager on my network?

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How


How To Protect Your Network From Attack From Outside From Inside And Outside

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

System Management. What are my options for deploying System Management on remote computers?

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Database Security Guide

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Did you know your security solution can help with PCI compliance too?

ManageEngine Desktop Central Training

An Introduction to Network Vulnerability Testing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

AN OVERVIEW OF VULNERABILITY SCANNERS

Managing Remote Access

Microsoft Baseline Security Analyzer

Windows Remote Access

Windows 7, Enterprise Desktop Support Technician

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

Chapter 9 Firewalls and Intrusion Prevention Systems

FileCloud Security FAQ

GFI Product Manual. Deployment Guide

EZblue BusinessServer The All - In - One Server For Your Home And Business

Chapter 9 Monitoring System Performance

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Penetration Testing Report Client: Business Solutions June 15 th 2015

Rapid Vulnerability Assessment Report

Network Instruments white paper

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

WhatsUp Gold v16.3 Installation and Configuration Guide

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Windows Server 2008/2012 Server Hardening

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Security Controls for the Autodesk 360 Managed Services

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Windows Server 2003 default services

Data Stored on a Windows Server Connected to a Network

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Transcription:

Security Audit Report for ACME Corporation Acme Security Audit 1

Table of Contents Acme Security Audit...3 Executive Summary...3 Security Architecture and Design...5 Network Security...7 Host Security...10 Linux/FreeBSD Host Security...10 Windows Host Security...13 Physical Security...18 Acme Security Audit 2

Acme Security Audit Executive Summary This report represents the final result of a security audit of the Acme web based systems. The audit was performed by examining the Acme security policy, taking a snapshot of the state of the systems, running a collection of analysis programs and staff discussions. The security audit examined all significant facets of the Acme.com network that would affect its security level, including host and network security, physical security, network services and finally the overall security architecture of the network. Major Issues We found security issues in several different areas of the Acme.com network. The most serious are the following: The first line of defense, the firewall, has been setup properly, but the second line of defense, server configuration is lacking in network services security, user account security, password policy and file system security. If an intruder breaches the firewall, the system offers little defense for server security There is no separation between the Web servers and the Database servers on the production network. If an attacker gains access to a Web server, he has full network access to the Database servers. A DMZ network zone needs to be established in order to achieve this separation The network servers on the DMZ network of the Acme corporate office are exposed to Internet traffic. This makes it very easy for an attacker to gain access to the servers. This vulnerability is compounded by the fact that the corporate servers have a direct pathway into the production network by means of a VPN tunnel. By taking over a corporate server, an attacker will have little difficulty in penetrating the production network Several IIS installations display severe security holes. An attacker can exploit vulnerabilities within the IIS servers and can potentially gain remote administrative access to the servers. Patches and advisories are available for these vulnerabilities Additional Issues While not critical, these issues should be resolved in the near future: Antivirus implementation has occurred after infection (of Nimda and Code Red worms/viruses). The result of this is that these worms/viruses install backdoor programs that open the possibility of hackers to have full remote access to the servers Auditing and intrusion detection processes need to be put into place so that the system administration staff is notified of break-in attempts and other security breaches. We recommend Acme Security Audit 3

using readily available tools such as portsentry, logcheck and tripwire in order to automate these processes Patch installation processes need to be put in place so that security patches and hotfixes are applied to the servers as soon as security alerts are published. We recommend running, on a periodical basis, patch inspection tools available from Microsoft. For Linux servers, RedHat also offers an automated patch update service. We also recommend that the system administration staff subscribe to automated email notifications which contain security alerts and advisories from CERT and the SANS Institute Conclusion We have found several critical security inconsistencies in the Acme.com network that require immediate attention. The problems of the site are not insurmountable, and other than the DMZ zone setup within the production network, most of the issues can be resolved rapidly. Difficulties such as having numerous small problems on the individual hosts, as well as having some significant network issues indicate a general problem with allocating resources to solve basic security issues. The system staff is generally knowledgeable about security, but needs to spend more time on day-to-day system administrative tasks as well as achieving more consistency and order into the organization of the systems. We recommend the system staff to concentrate on the major issues fixing the configuration problems on the network and then methodically fixing all the host-based problems that were found. After the basic problems are resolved, the next effort should be focused on enforcing policy, updating documentation, and putting into place procedures and programs that would prevent security problems from recurring. Overall Ranking Overall Security Assessment (2.4 out of 5) * * * Security Architecture and Design * * Network Security * * Linux / FreeBSD Host Security * * * Windows Host Security * * Physical Security * * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Acme Security Audit 4

Security Architecture and Design Introduction This section discusses the overall layout of the system infrastructure of the Acme Web site, as well as the layout of the corporate network architecture. While not part of the production infrastructure, the corporate servers are very important from a security point of view because of the special trust relationships and patterns of access to the production servers. We have found significant security vulnerabilities in the corporate network infrastructure. We also discuss specific issues with the border router and the firewall which isolate the production network from general Internet network traffic. Security Architecture & Design Assessment * * Production Network Architecture at Colocation facility * * Border Router * * PIX Firewall Implementation * * * * Corporate Network Architecture * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o The Acme production infrastructure is hosted at a colocation facility o The Acme production infrastructure is protected by a robust firewall o The firewall has almost all ports closed, with the exception of HTTP and SSL traffic o IPSec is being used to access the production servers via client VPN software Weak points: o The network design of the production site is flat, with no separation between the Web servers and the Database servers o The border router does not implement proper access control list in order to prevent spoofing and denial of service attacks o The corporate network servers on the DMZ network are totally exposed to all Internet traffic o There is a strong trust relationship between the corporate servers on the DMZ network and the production servers -- the former are allowed VPN access into the latter. This is particularly dangerous because of the exposure of the corporate servers to all Internet traffic Acme Security Audit 5

Production Network Architecture at the data center There is no DMZ (De-Militarized Zone) on the production network firewall at the data center Consider setting up DMZ on firewall in order to isolate Web servers from Database servers; this prevents intruders to gain access to the Database servers even if they do gain access to the Web servers Border Router (SANS Top 20 Security Vulnerabilities) Set up rules against denial of service originating from production network o Allow only internal addresses to enter the router from the internal interfaces Set up rules against source routing Firewall Implementation Security Risk: Medium Do not allow incoming traffic over the Internet into the production network from unprotected servers at the corporate network; a VPN connection should be used instead o Traffic is currently allowed from several servers at the corporate network to ports 1433 (SQL Server) and 5631/5632 (PCAnywhere) on several production servers Corporate Network Architecture Set up DMZ properly o The current setup is to use the DMZ port on the NetScreen firewall in transparent mode, which effectively leaves all servers on the DMZ open to the world o Implement NAT and block all incoming traffic Acme Security Audit 6

Network Security Introduction This section discusses the security of the Acme production servers as it relates to services and applications visible from the network. It is particularly important to look at vulnerabilities related to Web servers and applications, since the firewall does not block HTTP traffic. It is also important to look at the network security of not only the production servers, but also of the corporate servers, since they are enjoying a strong trust relationship in terms of security with the production environment. We also look at common network services such as mail, DNS and NFS. Network Security Assessment * * Network Services * * Web Server Security * * Mail * DNS * * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o telnet and ftp access is disabled on the production servers o tcp_wrappers is installed on the production Linux servers, enabling enhanced logging capabilities o Unnecessary services are disabled on the production servers o DNS servers are up-to-date in terms of software versions and do not allow zone transfers; reverse DNS lookups do not reveal server names that might help an attacker in guessing the function of the servers o NFS is being used on only one production server and the NFS exports are restricted to a small number of servers Weak points: o All corporate servers on the DMZ network have a large number of open ports accessible by anybody on the Internet; the services running on these port numbers cover a large portion of the SANS Top 20 security vulnerabilities and can be easily exploited by attackers in order to gain full control over the servers o A simple network scan reveals Web servers running on non-standard port numbers, which can be used to gain access to valuable information (Compaq Management Server for example) Acme Security Audit 7

o Several IIS installations on the corporate network display severe security holes which can be used to gain access to the servers; some of these vulnerabilities have been discovered two years ago and patches are available o The corporate mail server allows relaying and can be used by spammers to send mail to third parties Network Services Disable RPC/portmapper on Linux/FreeBSD servers which do not need to run NFS (ns1, ns2, mail) (SANS Top 20 Security Vulnerabilities) Fix the NULL session bug on all Windows servers; this allows an attacker to connect to the IPC$ share over the network with blank user name and password and then to enumerate shares, users and groups on the servers. This can be fixed by blocking the NetBIOS ports at the border router or at the firewall (SANS Top 20 Security Vulnerabilities) Security Risk: Medium Disable rsh, rexec and the other r services on all Linux/FreeBSD servers (SANS Top 20 Security Vulnerabilities) Web Server Security Several IIS installations display severe security holes such as the MDAC RDS vulnerability (CVE entry CVE-1999-1011), the Index Server Directory Traversal vulnerability (CVE entry CVE- 2000-0097) and various ISAPI filters and IIS/FrontPage extensions vulnerabilities (idq.dll, webhits.dll, etc.) (SANS Top 20 Security Vulnerabilities) Several production and corporate servers run the ColdFusion Administration server on publiclyaccessible IP addresses Mail mail.acme.com allows relaying o malicious users are able to send unsolicited mail to third parties using mail.acme.com as their SMTP server DNS Acme Security Audit 8

Security Risk: Medium Recursive queries are allowed against ns1.acme.com and ns2.acme.com. This may allow DNS cache poisoning attacks against the servers. Security Risk: Low Logging is not implemented; consider logging various aspects of DNS operations for easier auditing and monitoring Acme Security Audit 9

Host Security Linux/FreeBSD Host Security Introduction In this section we examine the overall security of the servers running Linux and FreeBSD. We looked at security settings and processes at the host and operating system level, such as user accounts and passwords, file systems, auditing and intrusion detection. Most of the Linux servers we looked at are running RedHat 7.1, which provides a fairly good security out of the box. We recommend upgrading all servers to RedHat 7.1 and running Linux-specific security hardening tools such as Bastille on a regular basis. Linux / FreeBSD Host Security Assessment * * * User Account and Password Policies * * File System Security * * * Services * * * Apache Security * * * * Auditing and Intrusion Detection * * Security Patches * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o File system security is generally strong o Services are well secured, with the exception of RPC services on some servers o Security for the Apache web server is generally strong o Syslog events are being sent from production servers to a central location o Process is in place for subscribing to Red Hat automated patch updates Weak points: o There is no enforcement of strong user passwords and no aging and expiration of passwords o There is no automated process in place for monitoring suspicious file permissions and ownership o There is no automated process in place for monitoring log files events o Security patches have not been applied recently Acme Security Audit 10

User Account and Password Policies Set password aging and expiration; currently no aging and expiration are set, in contradiction with the stated security policy Security Risk: Medium Use sudo to execute commands which require root privileges; sudo logs all commands, as opposed to su Security Risk: Low Set /bin/false as the default shell in /etc/passwd for system accounts (e.g. uucp, mail, news) File System Security Do not allow world-writable files, especially owned by root Security Risk: Low Look for suspicious SUID and SGID files Look for files with no real owner Write scripts to periodically monitor the file system for the file types listed above Services Disable any RPC services which are not necessary Apache Security Security Risk: Medium Consider running the httpd daemon with a user and group other than nobody, since nobody is treated in a special way on NFS servers and clients Acme Security Audit 11

Auditing and Intrusion Detection There currently is no auditing process in place; exploits are being tried against servers with no alerts being triggered All logs need to be monitored periodically The implementation of sending syslog events to a remote server is incorrect on ns1.acme.com; instead of syslog events being sent to the remote server, a file called messages?@loghost is being created Security Patches Periodically download relevant security patches from the vendor sites and apply them Acme Security Audit 12

Windows Host Security Introduction In this section we examine the overall security of the servers running Windows NT/2000. We examined the servers to make sure that a strategy is in place for keeping up to date on the latest security patches and virus definition files. User rights and file permissions were analyzed to make sure that appropriate permissions are being applied. Lastly, we examined the setup of IIS, ColdFusion, and SQL Server for security vulnerabilities. Windows Host Security Assessment * * User Account and Password Policies * File System Security * User Rights * * * Share Permissions * * * * * Auditing and Intrusion Detection * Antivirus * * Hotfixes/Patches * * IIS/ColdFusion * * SQL Server * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o Shared folders are generally administrative shares, and as such, are hidden from view o User Rights were generally well secured o NTFS permissions are set using groups instead of individual users o NTFS used for file partitions allowing for greater security and error recovery Weak points: o Auditing was incorrectly implemented resulting in no auditing being performed o Password Policies were incorrectly implemented resulting in Windows default Password Policies being applied o User accounts that were created with Administrator access to run critical processes (sqlexecservice) are currently being used to logon to the network o Most directories are setup with Everyone Full Control access Acme Security Audit 13

o Spotty implementation of security patches o Several servers infected with viruses including CodeRed II and Nimda User Account and Password Policies Account Policies were setup incorrectly by using Domain Controller Security Policy instead of using Domain Security Policy. The Account Policies that were setup using the Domain Controller Security Policy window were overridden by the default values provided in the Domain Security Policy window. As a result, the only Account Policies that are in affect are the default Account Policies setup by Windows when it is first installed, which are very weak o No minimum password length required o No minimum/maximum password age o No password complexity requirements o No lockout after unsuccessful logon attempts Most passwords are setup to never expire. Most user accounts should be setup so that their passwords expire on a regular basis Security Risk: Medium Administrator and Guest accounts should be renamed. If the Administrator and Guest accounts are renamed, it makes it more difficult for a hacker to gain unauthorized access into the network. Not only should this be done for the domain Administrator and Guests Accounts, but should also be done for the local Administrator and Guest accounts Security Risk: Low The same password is being used for the local Administrator account on multiple Member Servers. User will not be prompted for password while accessing another server that has the same password when logged on using the Administrator account. This allows the user access to resources on multiple computers with only having to logon once The logon screen shows the last user logged on to the system. This gives a hacker a valid user name. Now all the hacker needs to do is to attempt to hack the password to gain access to the system The screen saver should be configured to password protect the screen after a number of minutes of inactivity. If the user forgets to logoff or lock the terminal, it will be done automatically after a number of minutes of inactivity Acme Security Audit 14

File System Security (SANS Top 20 Security Vulnerabilities) Everyone Group has Full Control on most directories (Windows default). Change to appropriate permissions User Rights Security Risk: Medium Tighten permission on the following User Account policies: Auditing and Intrusion Detection (SANS Top 20 Security Vulnerabilities) On the Domain Controller, Auditing Policies were setup incorrectly by using Local Security Policy instead of using Domain Controller Security Policy. The Local Security Policies that were setup were overridden by the values provided in the Domain Controller Security Policy window. The Domain Controller Security Policies specified that no auditing was to be performed Event Logs are not being checked for security breaches. If they were being checked, the incorrectly configured Auditing Policies listed above would have been discovered Security Risk: Medium Event Logs on some servers are only being kept for seven days. If a prolonged security breach takes place, critical log data used analyze the extent of the breach will be lost Security Risk: Low Implement a warning logon message to warn intruders that Acme will prosecute unauthorized access attempts Antivirus Antivirus software needs to be installed on all Windows servers on the network. Some Windows servers had no antivirus software installed Of the servers that did have antivirus software installed, the antivirus software should be configured to download antivirus definitions on a more frequent basis. The current configuration downloads new virus definitions once a week. Since new viruses come out every day, it is advisable that definitions be downloaded everyday Acme Security Audit 15

Some production servers are currently infected (or have been infected in the past) with the Nimda and CodeRed II viruses. A Trojan program (Trojan.VirtualRoot) has been installed on these servers that can allow a hacker to have full remote access to these servers by issuing a HTTP GET request to run scripts\root.exe on the infected web server. It is recommended that a CodeRed removal tool be run against these servers. Once a computer has been attacked by W32.Nimda.A@mm, it is possible that your system has been accessed remotely by an unauthorized user. For this reason, it is impossible to guarantee the integrity of a system that has had such an infection. If you need to be certain that your organization is secure, you must reinstall the operating system, and restore files from a backup that was made before the infection took place, and change all passwords that may have been on the infected computers or that were accessible from it. This is the only way to ensure that your systems are safe Hotfixes/Patches Windows hotfixes/patches have not been applied equally across all servers in the network. While some servers were up to date with the latest patches, some servers were very far behind. We recommend that Acme download the latest version of HFNETCHK.EXE from the Microsoft web site. When run this tool tells you which hotfixes/patches are missing from a server or workstation IIS/ColdFusion (SANS Top 20 Security Vulnerabilities) Setup appropriate permissions on inetpub, wwwroot, ftproot, and script directories. On most of the servers, users were given too much access permissions to these directories because permissions were set to Everyone Full Control Setup appropriate permissions on Consumer, Corporate, and Admin WWW directories. Users were given too much access permissions to these directories because permissions were set to Everyone Full Control SQL Server Security Risk: Medium Any user in the local Admin group has complete access into SQL server. Remove all users within the local Admin group that do not need local Admin rights, or remove the BUILTIN\Administrators group from SQL Server. Acme Security Audit 16

Miscellaneous Items Only one Domain Controller exists in the domain. Active Directory security information gets distributed to all domain controllers in the domain. With only one domain controller, there is no redundancy for this information Security Risk: Medium Unnecessary services should be turned off. Each network service you run has the potential to open unknown and unprotected security holes. Additionally, they may be useful in helping an intruder attack other parts of the system Security Risk: Low Emergency Repair Disks are not being generated on a frequent basis. On some servers this has not been done in over a year. Without updated Emergency Repair Disks, it makes disaster recovery more difficult Acme Security Audit 17

Physical Security Introduction This section discusses the physical security of the Acme production servers. We looked at the security of the data center where the production servers are collocated, at the physical security of the servers themselves, and also at the disaster recovery procedures in place for the Acme production infrastructure. Physical Security Assessment * * * Colocation Facility Security * * * * Computer Security * * * Disaster Recovery * * * (ratings range from 1-5 stars, with 1 star being the worst and 5 stars being the best) Summary Strong points: o The production servers are hosted at the Acme data center in downtown Los Angeles o The servers are locked in cabinets with combination locks o Backups are being done for the Windows servers and the backup tapes are stored off-site Weak points: o Users are not logging off or locking the screen when using PCAnywhere to access the Windows servers o The production Linux servers are not being backed up Computer Security Users are not logging off from the console when they are done working on the server. If a malicious user gets past the PCAnywhere login, he has full access to the server desktop. Acme should consider implementing a User Policy that logs off users after a number of minutes of inactivity Acme Security Audit 18

Security Risk: Medium CMOS/BIOS access is not password-protected on Linux and Windows servers LILO is not password protected on Linux; a user with physical access to the console can boot in single-user mode and gain root access Security Risk: Low Consider disabling the CTRL-ALT-DEL combination on Linux servers to prevent users from rebooting the servers Disaster Recovery The production Linux servers are not being backed up Acme Security Audit 19