Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee



Similar documents
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Managed Service Plans

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Information Technology Security Procedures

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

General DBA Best Practices

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

GiftWrap 4.0 Security FAQ

Our Cloud Offers You a Brighter Future

1 Introduction 2. 2 Document Disclaimer 2

Autodesk PLM 360 Security Whitepaper

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Cyber Essentials Questionnaire

System Security Policy Management: Advanced Audit Tasks

System Management. What are my options for deploying System Management on remote computers?

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

MSP Service Matrix. Servers

Client Security Risk Assessment Questionnaire

RL Solutions Hosting Service Level Agreement

Retention & Destruction

Data Stored on a Windows Computer Connected to a Network

Industrial Security for Process Automation

WhatsUp Gold v16.3 Installation and Configuration Guide

Windows Operating Systems. Basic Security

Introduction. PCI DSS Overview

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Pearl Echo Installation Checklist

IBX Business Network Platform Information Security Controls Document Classification [Public]

Locking down a Hitachi ID Suite server

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Keyfort Cloud Services (KCS)

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Deploying a File Server Lesson 2

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

FileCruiser Backup & Restoring Guide

GFI White Paper PCI-DSS compliance and GFI Software products

Virtual Server and Storage Provisioning Service. Service Description

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Data Stored on a Windows Server Connected to a Network

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Chapter 12 Network Administration and Support

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Security Controls for the Autodesk 360 Managed Services

CA Cloud Overview Benefits of the Hyper-V Cloud

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Supplier Information Security Addendum for GE Restricted Data

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Firewalls Overview and Best Practices. White Paper

Security Policy JUNE 1, SalesNOW. Security Policy v v

Workflow Templates Library

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

A Decision Maker s Guide to Securing an IT Infrastructure

Managing and Maintaining a Windows Server 2003 Network Environment

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

ManageEngine Desktop Central Training

CONTENTS. Security Policy

CloudDesk - Security in the Cloud INFORMATION

Countering and reducing ICT security risks 1. Physical and environmental risks

F-Secure Messaging Security Gateway. Deployment Guide

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Backup & Disaster Recovery Appliance User Guide

Complete Managed Services. Proposal for managed services for the City of Tontitown

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Web Plus Security Features and Recommendations

Did you know your security solution can help with PCI compliance too?

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Security Policy for External Customers

System Security Plan University of Texas Health Science Center School of Public Health

Interact Intranet Version 7. Technical Requirements. August Interact

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Storage Guardian Remote Backup Restore and Archive Services

I.T. Assurance. Letting you do what you do best... run your business

Use of The Information Services Active Directory Service (AD) Code of Practice

Windows Server 2008 R2 Essentials

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Release Notes for Websense Security v7.2

Getting Started with Symantec Endpoint Protection

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Chapter 8: Security Measures Test your knowledge

Main Reference : Hall, James A Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Network Security Guidelines. e-governance

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Transcription:

Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server Security Best Practices Committee Revision Date: February 5, 2014 Version Number: 3.0.5 Acknowledgments The final release document is a collaborative work between the following committee members: Sunny Pradhan Bruce Harding Chase Elliot Christine Linton Usage Matthew Balaun The ever changing nature of information technology prevents this document from being entirely inclusive but should serve as a general guideline. This document is not intended to supersede or replace policy. Please feel free to query the Windows Server Team (winserv@kennesaw.edu) or the Systems Administrator Group (SysAdmin@list.kennesaw.edu) for additional guidance.

Table of Contents Initial Document... 1 Revision... 1 Acknowledgments... 1 Usage... 1 1. Infrastructure Best Practices... 4 1.1. Physical Security... 4 1.2. Power... 4 1.3. Fire Control... 4 1.4. Climate Control... 5 2. Redundant and Failover Configuration... 5 2.1. Redundant Servers... 5 2.2. Clustering and Failover... 5 2.3. Redundant Storage... 5 2.3.1. RAID... 5 2.3.2. SAN... 6 2.4. Virtualization... 6 3. Security Best Practices... 6 3.1. User Environment... 6 3.1.1. Server Account Control... 6 3.1.2. Administrator and Equivalents... 6 3.1.3. Delegating Control... 7 3.1.4. Password Policy... 7 3.2. File and Print Serving... 7 3.2.1. Folder and NTFS Permissions... 7 3.2.2. Print Serving... 7 3.3. Remote Access... 7 3.3.1. Terminal Services... 7 3.3.2. Of Campus Access... 7 3.4. OS Configuration and Maintenance... 8 Page 2 of 13

3.4.1. Security Measures... 8 3.4.1.1. Disable Unused Services... 8 3.4.1.2. Updates... 8 3.4.1.3. Service Packs... 8 3.4.1.4. Server Applications... 9 3.4.2. Audit Practices... 9 3.4.2.1. Log Retention... 9 3.4.2.2. Auditing... 9 4. Attack Footprint... 9 4.1. Security Software... 10 4.1.1 Antivirus and Antispyware... 10 4.2 Network Traffic... 10 4.2.1. Windows Firewall... 10 4.2.2. Software Host Firewall... 10 4.2.3. Internet Protocol Security (IPsec)... 11 5. Change Control... 11 6. Disaster Recovery Practices... 11 6.1. Backups... 11 6.2. Of site Backup Storage... 11 6.3. Test Backup Restores... 12 7. References and Resources... 12 Page 3 of 13

1. Infrastructure Best Practices Every server should have a designated functional purpose along with primary and secondary administrators, who will take responsibility for and correct any problems it may have. All servers, before (or immediately after) going live and on a regularly scheduled basis, must submit to a security scan by the Information Security Office to ensure it meets all criteria supplied by the ISO. 1.1. Physical Security Servers should always be located in a secure, locked area ideally equipped with cardkey access by authorized personnel only. Should an intruder gain access to a Windows server or its console, serious damage or data theft could occur. For example, this could be done directly through the Windows server console, by potentially booting the Windows server with a "Live CD" allowing easy access to server hard drives. As appropriate, for servers involved in a mission critical process, it is suggested the physical area of the servers and consoles be under constant camera surveillance. Keep a record of physical access. The access log generated by the server room key card system should be kept indefinitely, or as required by local or state regulation. 1.2. Power Servers should always have redundant power systems (a UPS, for example). This is for protection of the server hardware (offering some isolation from power surges, sags, and spikes). It also protects information on server hard drives by allowing the server to be gracefully powered down in an extended power outage. How long the redundant power system must support servers during a power failure is a function of the criticality of the servers. In noncritical, academic settings, a few minutes of redundant power may be all that is needed to smooth over a brief outage. However, for mission critical servers, it may be necessary to provide the capability of 24 by 7 redundant power. 1.3. Fire Control Page 4 of 13

Servers should not be placed in an area covered by a fire suppression sprinkler system. In such circumstances, even a minor fire can result in complete loss of servers and storage devices. Instead server should be located in server rooms which employ a non-conductive (FM200 or similar) fire suppression system. 1.4. Climate Control Server hardware is most reliable when it is operated in a cool environment. If the server room is too warm, seek assistance from campus physical plant operations to determine how the room can be better cooled. There should be a physical climate monitoring system in place. 2. Redundant and Failover Configuration 2.1. Redundant Servers Whenever possible, failover servers or appropriate redundancies should be in place to prevent downtime in the case of a disaster. 2.2. Clustering and Failover If the operation of a server is critical, consider server clustering and/or server failover. Windows server software is capable of both. Ideally, for clustering server hardware should be as identical as possible. 2.3. Redundant Storage Server hard drives are heavily used; therefore, it's important that some form of redundant storage be provided. It is not unusual to have a single hard drive failure in a file server. Various methods for protecting against such failures are available and should be employed. 2.3.1. RAID Servers support redundant storage in two ways. Two or more drives can actually be installed in a Windows server and drive mirroring or a stripe set with parity can be enabled in the hardware configuration. Optionally, redundant storage hardware can be purchased from many vendors. These redundant Storage Systems appear to a Windows server to be a single drive but provide continued operation in the event of a single drive failure. Common RAID configuration is RAID 1 Page 5 of 13

for the operating system, RAID 5 with a hot spare for data, or if supported, RAID 6 for data on large drives (1TB and larger). 2.3.2. SAN A storage area network is an alternative to using RAID drives. They provide a virtual storage environment made up of multiple hard drives, a piece of which is provided to particular servers for their use. Storage area networks typically employ one or more forms of redundant recovery to maximize uptime. Some SAN solutions also include automatic backup capabilities. Storage area networks are available from many server hardware vendors. 2.4. Virtualization Virtualization offers another type of redundancy. Systems deployed in a virtual environment can be afforded protection from resource issues; such as, power, memory, and storage. Hardware maintenance in the virtual environment usually does not require the guest server to be down as it can be moved to another host, thereby improving availability. 3. Security Best Practices 3.1. User Environment Servers are for providing university services, not to be used as a workstation. Any interactive use of a server should be limited to the scope of the server s operational function. Activities like browsing the internet or reading email should be avoided. Further, applications designed for desktop use should not be installed on a server. Servers should have minimal installed applications while still allowing required functionality within the environment. 3.1.1. Server Account Control Each individual should have a unique user id (netid) that can be referenced to a person's full name and contact information. The use of local accounts should be avoided. Accounts should have an expiration date. Accounts should be given only privileges that are needed. This applies to accounts for users, resources, applications, and service accounts. 3.1.2. Administrator and Equivalents Page 6 of 13

The administrator account should be renamed and never used for day-to-day operations. The number of persons knowing the administrator login should be strictly limited. 3.1.3. Delegating Control Windows Active Directory allows control of Organizational Units to be delegated, in lieu of using the administrator account or equivalents. This should be standard practice. 3.1.4. Password Policy Passwords should be required for all accounts. Further, passwords should be required to be complex (a mix of letters, numbers, and special characters) or lengthy (as in pass- phrases.) Users should be required to change passwords at some regular interval. Passwords should always follow the specifications set forth in current university policy. 3.2. File and Print Serving 3.2.1. Folder and NTFS Permissions Be aware of the differences between folder share and NTFS permissions. It is normal practice to set share permission so EVERYONE has FULL CONTROL and then use NTFS permissions to regulate file level access. 3.2.2. Print Management Be careful to set printer permissions to control access and take advantage of Group Policies that allow deployment of printers by user and computer (Windows Server 2003 R2 and later.) They eliminate the need for scripts and the like to install printer on user PCs. 3.3. Remote Access 3.3.1. Terminal Services If terminal services are provided, remote desktop access should be restricted to domain administrators and/or the primary and secondary administrators of that server. 3.3.2. Off Campus Access Off campus access should be restricted to VPN-authenticated users. Page 7 of 13

3.4. OS Configuration and Maintenance 3.4.1. Security Measures 3.4.1.1. Disable Unused Services Windows Server has many processes it uses to provide a wide array of services to users. Not every server uses or needs every service to be either installed or running. Any services that can be stopped, disabled, or removed without adversely affecting the performance of the system should be so configured. For Windows Server 2003, there is a list of 102 services, outlined by name and function, with information about whether they can be stopped or disabled, which can be found at: http://downloads.techrepublic.com.com/abstract.aspx?docid=172015 For Windows 2008 and later, Microsoft has taken a different approach with role-based services only being added to the server as needed. There is also a Server Core installation option which further removes any unnecessary components or services. 3.4.1.2. Updates Currently, Microsoft releases updates to its operating systems on a monthly basis. However, updates of a more urgent nature, may be released off-schedule due to importance. Because of the constant security threats against servers it is important to apply updates from Microsoft as quickly as possible after they are released. It is, however, recommended that patches released on "Patch Tuesday" are applied to test a system (or a group of test systems as appropriate to the environment) and monitored for a minimum of 5 days to verify application functionality and determine any adverse performance impact. During this time, it is also wise to research any known issues associated with patches and ensure countermeasures are in place. Patches can then, in most cases, be safely deployed to remaining systems according to a schedule coordinated with stakeholders. 3.4.1.3. Service Packs Periodically, Microsoft bundles all previous updates and corrections for Windows Server into a service pack. Service packs, when installed, simply replace files that have been corrected by Microsoft. It is recommended to apply a service pack to a test system first, while waiting a period of time before deploying the service pack to production systems. Microsoft has, in the past, released defective service packs. Once a service pack has been released, a minimum of 30 days should be allowed to confirm the service pack s functionality. Testing of the service pack in Page 8 of 13

a particular environment is highly encouraged along with internet research for any known issues associated with the service pack. 3.4.1.4. Server Applications Patching or updating server applications is also important. The same testing and research associated with operating system service packs should also be performed with server application updates or patches. Additionally, the associated application administrators and customers should perform this process as much as possible. 3.4.2. Audit Practices Servers have a powerful auditing feature built in. It is usually disabled by default but can be easily enabled. Typically, server managers would want the auditing system to capture logins, attempted logins, logouts, administrative activities, and perhaps attempts to access or delete critical system files. Auditing should be limited to gathering just the information that is needed, as it does require CPU and disk time for auditing to gather information. Log Management software should be used, if possible, for ease of managing and analyzing information. Auditing in most cases can be enabled by group policy, so any new servers added into the associated OU will have it automatically enabled and turned on. 3.4.2.1. Log Retention Servers keep multiple logs and, by default, may not be set to reuse log file entries. It is a good practice to expand the size of the allowed log file and to set it to reuse space as needed. This allows logging to continue uninterrupted. How far back log entries go will depend on the size of the log file and how quickly log data accumulates. If the server environment is critical, it may be appropriate to ensure that the log file size is sufficient to store the required logging information as dictated by current university policy. Doing so would allow going back to any previous log file entries via the event viewer (as might be required for an audit or legal issue). If a system log server is employed, the local log storage time may be reduced. 3.4.2.2. Auditing Preserve, review, and analyze logs as appropriate for the environment. The ISO group can provide guidance regarding guidelines to protect the university. 4. Attack Footprint Page 9 of 13

4.1. Security Software Servers are vulnerable to many forms of attack. Implementation and standardization of security methods should be developed to allow early and rapid deployment on servers. It's important that Windows servers be equipped with at least the following protective software: 4.1.1 Antivirus and Antispyware Users may unknowingly place virus infected files on the server, which may be shared among other users, thus infecting additional systems. Every Windows server should have some form of virus scanner that is kept current with the latest virus definitions. While it's unlikely that an end user will cause spyware to infect a Windows server, it is possible that a server administrator, accessing the Internet from the console, might unknowingly cause spyware software to infect a server. For that reason, it is reasonable to install anti-spyware software directly on a server and to make sure that it stays up to date. It is strongly encouraged that you use the approved antivirus and antispyware application. Please contact iso@kennesaw.edu for more information on the approved security software. 4.2 Network Traffic Kennesaw State University employs a campus firewall that protects the campus environment from Internet threats. However, the Campus firewall does nothing to protect servers from threats generated on campus. For that reason, it is reasonable to employ some form of a software firewall on a Windows server. At minimum ports not required to be open for the server to function properly should be blocked by a host firewall. 4.2.1. Windows Firewall Windows firewall is included with any version of the Windows operating system. It offers a rudimentary tool to block traffic on certain ports. 4.2.2. Software Host Firewall There are many third party firewall software packages that are more sophisticated and more capable than the included Windows firewall. Most, however, are not designed for a server environment. In a multi-server environment, there are a few others that offer centralized Page 10 of 13

firewall policy management. Symantec Endpoint Protection does offer such a host firewall as an added benefit to their antivirus antispyware client. 4.2.3. Internet Protocol Security (IPsec) Internet Protocol Security (IPsec) can be implemented as another layer of security, along with a firewall, protecting communication over IP on your server. 5. Change Control System administrators should maintain a log, written or electronic, of all changes to the operating environment, to include hardware, system security software, operating system, and applications. Prior to any changes being implemented on a production system, the system administrator should receive approval from the change management team. Team should be comprised of stakeholders and IT professionals. 6. Disaster Recovery Practices 6.1. Backups It is very important that servers be backed up on a regular basis. Depending on the use of the server, it may be adequate to backup the server once per week. A backup of a more critical environment may be needed daily, and possibly continuously. The backup program provided with Windows is capable of backing up to virtually any writable media, which can include network drives provided by a server in another physical location. This program is also capable of scheduling backups which can ensure backups occur on a regular interval. Should a more sophisticated backup program be required, there are several excellent choices available in the marketplace. 6.2. Offsite Backup Storage It is very important that one backup set be taken off site on a regular basis. This is to prevent a total loss should the physical facility be lost in a fire or other disaster. Offsite backup storage should adhere to current university policy. Page 11 of 13

6.3. Test Backup Restores It is critical that a backup set occasionally be fully restored to a test system. This is to ensure that the backups are occurring as they should and they, in fact, can be restored when necessary. It is suggested that a backup set restore be tested once per quarter, but once a month might be appropriate in more critical environments. 7. References and Resources This document is intended to serve as a brief introduction to activities and guidelines that should be followed by all managers of servers. This guide is intended to be very practical and thus is a little shy on details. Plenty of documents can be found on the Internet which describe Windows Server best practices in detail. The reader should also be aware that Microsoft offers an excellent resource for Windows Server managers called TechNet found at http://technet.microsoft.com/en-us/ and Microsoft Events found at http://msevents.microsoft.com/ Microsoft also makes available in excellent series of documents related to Windows Server Best Practices. Those documents cover basic configuration, operations, and security. Certainly, some of the more important documents are the Windows Server 2003 Security Guide which can be found at: http://www.microsoft.com/technet/security/prodtech/windowsserver2003/w2003hg/sgch00. mspx Windows Server 2008 Security Guide, found at: http://www.microsoft.com/downloads/details.aspx?familyid=fb8b981f-227c-4af6-a44bb115696a80ac&displaylang=en Also with the release of Windows Server 2008 R2 rather than providing a copy to every baseline operating system, Microsoft provides Security Compliance Manager 2 (SCM 2). SCM 2 is a free tool from the Microsoft Solution Accelerator. More Information and download information can be found at: http://technet.microsoft.com/en-us/library/gg236605.aspx Page 12 of 13

Microsoft also provides an excellent tool called the Baseline Security Analyzer for analyzing the security configuration of any Windows workstation or server. Through its use, the user can learn what weaknesses exist in the setup of the Windows Server operating system being analyzed. The Baseline Security Analyzer also provides excellent recommendations based on any weaknesses that it finds. The Baseline Security Analyzer can be located at: http://www.microsoft.com/technet/security/tools/mbsahome.mspx Page 13 of 13