TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM



Similar documents
GOALS. Server Management Program Review / Training. To Review SMP structure, requirements, logistics. To increase quality and benefit of documentation

Server Security Checklist (2009 Standard)

Client Security Risk Assessment Questionnaire

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Security Standard: Servers, Server-based Applications and Databases

Information Technology Security Procedures

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

REDCENTRIC MANAGED SERVER SERVICE DEFINITION

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

System Management. What are my options for deploying System Management on remote computers?

A Guide to New Features in Propalms OneGate 4.0

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Web Plus Security Features and Recommendations

Introduction. PCI DSS Overview

System Security Policy Management: Advanced Audit Tasks

GFI White Paper PCI-DSS compliance and GFI Software products

F-Secure Messaging Security Gateway. Deployment Guide

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Vendor Questionnaire

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Secure Compute Research Environment Data Security Plan (DSP)

Procedure Title: TennDent HIPAA Security Awareness and Training

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Data Stored on a Windows Server Connected to a Network

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Supplier Information Security Addendum for GE Restricted Data

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Cybersecurity Health Check At A Glance

Version: Page 1 of 5

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

GE Measurement & Control. Cyber Security for NEI 08-09

2012 Risk Assessment Workshop

Secondary DMZ: DMZ (2)

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Use of The Information Services Active Directory Service (AD) Code of Practice

Advanced Administration

H.I.P.A.A. Compliance Made Easy Products and Services

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Central Agency for Information Technology

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Mac OS X Security Checklist:

Retention & Destruction

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Network and Security Controls

Setting Up Scan to SMB on TaskALFA series MFP s.

Directory and File Transfer Services. Chapter 7

Information security controls. Briefing for clients on Experian information security controls

Security Best Practice

CHIS, Inc. Privacy General Guidelines

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

1B1 SECURITY RESPONSIBILITY

QuickStart Guide for Managing Computers. Version 9.2

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

SNAP WEBHOST SECURITY POLICY

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar

IBM. Vulnerability scanning and best practices

Web Application Vulnerability Testing with Nessus

F-SECURE MESSAGING SECURITY GATEWAY

IT Sr. Systems Administrator

User Management Guide

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

1 Introduction 2. 2 Document Disclaimer 2

Codes of Connection for Devices Connected to Newcastle University ICT Network

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Payment Card Industry Self-Assessment Questionnaire

74% 96 Action Items. Compliance

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Agency Pre Migration Tasks

Did you know your security solution can help with PCI compliance too?

EMR Link Server Interface Installation

System Compatibility. Enhancements. Security. SonicWALL Security Appliance Release Notes

Fortinet Solutions for Compliance Requirements

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Data Stored on a Windows Computer Connected to a Network

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

INFORMATION SECURITY TRAINING CATALOG (2015)

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Global Partner Management Notice

Transcription:

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State policy. Each server manager is accountable for performance of these responsibilities as well as timely creation and delivery of any required documentation to the AgriLife Information Security Officer. Questions or inability to perform the below responsibilities should be communicated to the Information Security Officer. 0 P age

Index Server Program Overview... 1 Summary of Documentation to be filed with ISO.. 8 New Server Implementation Check List 10 1 P age

Server Program Overview The server management program (SMP) effort has been developed and implemented within Texas AgriLife Extension Service, Texas AgriLife Research and the College of Agriculture and Life Sciences for the purpose of ensuring the safety, security, and availability of data. This program has been developed in accordance with all current state and university policies regarding the operation of computing resources, as well as responsible IT practices in general. The SMP effort applies to all server computing resources regardless of function, funding resource or owner. Each server owner and the designated resource managers are accountable for performance of the duties outlined within this document. The SMP is comprised of the following overall components and responsibilities: Server Operations Tasks This set of tasks must be performed throughout the lifetime of the server based upon server classification Server Operations Documentation Requirements Some tasks require that documentation be created to formalize a process or activity related to the task. These documentation requirements are outlined along with each task description. All documentation related to ALL servers is required to be filed with the office of the Information Security Officer within AgriLife (no exceptions). Monthly participation in the Information System Security Meetings AgriLife IT conducts a monthly Information System Security (ISS) meeting the 2 nd Thursday of each month at 1:30 pm. A server manager or business owner is required to attend each of these meetings in order to meet compliancy rules regarding timely formal and documented reviews of system security updates and patches. These meetings can be attended in person or via Microsoft Lync. Receipt and remediation of automated monthly Nessus Vulnerability Scans AIT will provide automated monthly Nessus Vulnerability reports to each server manager resource. These reports are to be used to manage and document system vulnerability issues as required by state, system and agency policies. Additionally an automated on demand service function is provided. Formal Server Inventory Status Each unit or operation location that operates a server is required to notify the AgriLife Information Security Officer of each server added or removed from operation. Centrify Active Directory Integration for all LINUX and MAC servers AIT will provide Centrify licenses to facilitate centralized Active Directory account management for all Linux and MAC servers (Initial allocation, provided by AIT, will not exceed 5 licenses per unit. Additional licenses may be purchased, via AIT, on an as need basis). When possible all existing Windows Servers should be brought up to the standardized Windows Server Platform (currently Server 2008 R2) status and joined to the AGNET domain. 2 P age

New Server Implementation Check List The following can be facilitated by the Enterprise Centrify solution is used vs. local accounts on the server: Ensure passwords are updated at a maximum of 180days Ensure passwords meet complexity standards (Comprised of at least three of the following numeric, upper/lower case and special characters) Ensure password length a minimum of 8 characters. Ensure the logon banner is present for all server and workstation systems. Ensure password history enabled Ensure password changes are logged to the specific IP with time/date stamp. Ensure credentials are hashed and not viewable in plain text when stored on the server. Implement time activated logon ID lock Ensure logging enabled to record when a last successful login took place. Ensure session timeouts in place. The following items apply to all servers: Ensure DNS resolution performed by a dedicated DNS server. Ensure Anti Virus solution (Sophos) is installed on the server. Disable or change passwords for all default IDs Ensure logging is enabled for IDs that have root permissions. o IF SUDO installed and users instructed to utilize that feature instead of logging in with the root ID. Ensure SSH is used for all interactive and FTP connections 1 Ensure file sharing disabled (If not, limit only to specific IP s or subnet range) Ensure authentication only providing the minimum amount of information required. Ensure anonymous binds are disabled for LDAP. Ensure all remote console functions are managed through VPN services. Verify that only the required ports are open through the University or regional center firewall. Ensure all services are turned off that are not required and document those services that are required. Perform a vulnerability scan BEFORE putting system into full production mode. For Servers with Web Servers: Utilize only the latest version of web and database server software Verify http track and trace are disabled. Ensure directory traversal has been disabled in the web service configuration. Confirm that web statistics are only viewable to those requiring the information. Verify that all authentications for web application forms use encrypted protocols and auto fill is turned off Verify that uploads are limited to an authenticated directory and restricted to acceptable file formats. Verify directory indexing is turned off Verify form field validation is implemented to prevent buffer overflows. Verify that Escaped or parameterized input fields are used to avoid SQL injection Ensure all test and development code is removed 1 For details on securing FTP please see the follow URL http://forums.iis.net/t/1147827.aspx 3 P age

Server Tasks Account Backups/Data Restoration- Recovery Change (R denotes Recommended Tasks/Documents) Disaster Recovery (R denotes Recommended Tasks/Documents) Incident Malicious Software Confidential Information Scanning Frequency Employee creation, termination or at time of a change in job responsibilities Task/Other Requirements Annual Update/ to ISO Login ID's should all be unique and not shared Update Account Process Access of accounts must be modified appropriately per user employment and responsibilities and modified if any change in job duties necessitates a change. Named accounts must be used for systems storing confidential or mission critical information Account must be removed by the timelines indicated in the agency or college Account Rules & Procedure Update Documents - unless otherwise indicated should be uploaded to https://agrilifesmp.tamu e Documentation for each account creation, change and deletion (Uploaded at least quarterly to SMP Portal) Daily Backup Update Documented process of backup procedure R Store backup in an off-site location Update Documented process of recovery procedure "R" Denotes Recommended Task Monthly Testing of backups (minumum) Update Documented findings of recovery test Annually Testing of Recovery Process At Occurrence R At Occurrence R Annually R Manually performed change tasks must be logged after each action. Redundancies should be assessed to maintain higher level of continual service R R Update Documented change management log R Update Documented process of change management procedure Current DR plan (format should be based on AIT provided templates available at http://agrilife org/it/itmanagement/#smp) Annually R Testing of the disaster recovery process R Update Documented Testing Routine As Identified Ongoing Ongoing Annually At Occurrence Annually Automated changes logged by servicing provider (Red Hat Service Monitor, WSUS server, etc.) All secuirty incidents on ANY server platform should be reported immediately to AgriLife Information Security Officer via the Security Incident Reporting web site http://agrilifesirs.tamu.edu/ or via email at securityhelp@ag.tamu.edu Install Sophos Anti-virus and Data Leakage protection client Manage client status and automatic updates through Sophos console R Update R Scan of all data on servers required to identify any confidential information Following authorization, all confidential information existing on any server should be encrypted as per guidelines provided by the Information Security Officer Perform due diligence to ensure "shelved" media (.e.g CDs, DVDs, external HDDs, etc.) scanned and cleared of confidential information Documented findings of testing routine and mitigation/remediation actions performed Password escrow maintained with unit or center head All non-enterprise Sophos system managers must submit a monthly electronic report, per specifications, to the AgriLife Information Security Officer by the 4th of each month Documented findings, of server scan, and rememdiation steps for each server Special Requirements If not utilizing Agnet Active Directory/AgriLife APM system the indicated documentation is required All server change entries (hardware, application) must be documented as having been performed and must include What, Who, Date and Time If a critical update or operation is deferred it should be documented and approved by unit head as to the reason and acceptance of the risk associated by deferral Documentation must be created for all testing results and submitted to the department or unit head for signature and a copy provided to the Information Security Officer All servers requiring the persistence of confidential information must be authorized by the Information Security Officer. Exceptions authorizing the storage of confidential information on University systems must be granted using the exclusion process for Risk Mitigation measures - http://rulessaps.tamu.edu/pdfs/29.01.03.m1.27.pdf

Server Tasks Frequency Password/ Weekly Monitor account activity logs Authentication/ Monthly Monitor account activity logs Inactivity/ Logout. Applies only to servers not joined to the Agnet Active Directory system Applies only to Physical Security Risk Assessment (ISAAC - University, ISAAC-S, Agencies) Patch For all servers that do not use the Agnet WSUS or Red Hat Subscription services Security Monitoring Vulnerability Assessment. Required for all systems that are unreachable by the AIT Nessus Vulnerability scanner. For those systems monitored by the AIT Nessus Scanner a weekly report is automatically delivered to each unit. Not to exceed 180 days Update passwords at routine intervals R At Occurrence Ongoing R Ongoing Annually Annually Monthly Task/Other Requirements Timer activated, password protected screen savers must be in place House server in secure, locked, limited access location Maintain log sheet for all access to server location if automated control system not in use Annual Update/ to ISO Documents unless otherwise indicated should be uploaded to https://agrilifesmp.tamu.edu/ Documented audit log showing results of account activity log review Monthly (at minimum) As Identified Critical updates and patches Weekly Event logs must be generated and reviewed Document review process and systems Monthly Event logs must be generated and reviewed Maintain event logs for minimum of 3 months Report all security events to the AgriLife As Identified Information Security Officer Quarterly As Identified Accounts lock after a maximum of 5 bad attempts and remain locked a minimum of 15 minutes Where present, IT managers of a UNIT or LOCATION must coordinate with server owners to complete an accurate ISAAC review for all servers in the UNIT Discovery of any remediation elements will require the establishment of remediation steps and resolve date documented with the office of the Information Security Officer Attend AgriLife Information Security Officer's Information Systems Security meeting Operating System and application software patches/updates applied and confirmed Conduct Server Vulnerability Scan (Nessus or other recognized utility) Discovery of any vulnerabilites will require the establishment of remediation steps and resolve by date with the Information Security Officer Quarterly (Dec 8, 2014 ) Quarterly Update Server location access log Risk Assessment (ISAAC) form must be filled out for ALL servers within a unit or location REGARDLESS of the funding, owner or purpose of the server Documented remediation steps, for each server, including resolution date Documented patch/update installation in Change log including dates/times actions performed Quarterly Document /log detailing date, time and server log reviewed If not scanned by the AIT-Nessus Scanner a documented Risk Assessment Review Report must be created and the latest report uploaded to the SMP portal.. Documented log of any remediation efforts Special Requirements Passwords must conform to University/Agency standards Password management and automated password generation routines must have the capability to maintain auditable transaction logs that include: Time/date of password change/expiration of administrative reset Type of action performed Source system that originally generated the password request Attendance to AgriLife ISO ISS Meeting can be made in person or via LYNC NOTE: If you are not listed as an owner of the system in the University Domain Name server, please e-mail securityhelp@ag.tamu.edu and a solution will be identified that is appropriate for your needs Regional Center Network Requirements Request server IP through AIT Network Group Server IP NAT'd private address unless there is a public access requirement Physical network interface card (NIC) use reviewed before implementation No server should have DHCP or DNS service turned on