GOALS. Server Management Program Review / Training. To Review SMP structure, requirements, logistics. To increase quality and benefit of documentation



Similar documents
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

REDCENTRIC MANAGED SERVER SERVICE DEFINITION

Server Security Checklist (2009 Standard)

Secondary DMZ: DMZ (2)

Version: Page 1 of 5

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Security Standard: Servers, Server-based Applications and Databases

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

ISAAC Risk Assessment Training

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Service Catalog. it s Managed Plan Service Catalog

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

MS-10751: Configuring and Deploying a Private Cloud with System Center Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Managing and Maintaining Windows Server 2008 Servers

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

AgriLife Information Technology IT General Session January 2010

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Office of Inspector General

Information Security Office

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Patch Management. Module VMware Inc. All rights reserved

INCIDENT RESPONSE CHECKLIST

Backup & Disaster Recovery Appliance User Guide

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Virtual Appliance Setup Guide

System Security Policy Management: Advanced Audit Tasks

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

2012 Risk Assessment Workshop

SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015

KeepVault Online Backup Quick Start Guide & User Manual

Tenable Network Security Support Portal. January 12, 2015 (Revision 14)

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

Ohio Supercomputer Center

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Customized Cloud Solution

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

Information and Communication Technology. Patch Management Policy

Patch Management Table of Contents:

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

Overview Customer Login Main Page VM Management Creation... 4 Editing a Virtual Machine... 6

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Managed Service Plans

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Guide to Vulnerability Management for Small Companies

M6430a Planning and Administering Windows Server 2008 Servers

HP RDX Continuous Data Protection Software Quickstart Guide

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Course 10751A: Configuring and Deploying a Private Cloud with System Center 2012

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

WolfTech Active Directory: SCCM 101

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide

White Paper: Librestream Security Overview

Implementing HIPAA Compliance with ScriptLogic

Shutting down / Rebooting Small Business Server 2003 Version 1.00

UNIT / CENTER XXX Disaster Recovery Plan

Your entire database (MySQL) All of your applications All of your images All of your configuration files All of your installation files

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

OCCS Procedure. Vulnerability Scanning and Management Procedure Reference Number: Last updated: September 6, 2011

VMware Mirage Web Manager Guide

Technical Standards for Information Security Measures for the Central Government Computer Systems

Unitrends, Inc. Software and Hardware Support Handbook

Data Management Policies. Sage ERP Online

Providing Patch Management With N-central. Version 7.2

Configuring and Deploying a Private Cloud with System Center 2012

State of Oregon. State of Oregon 1

Data Center Colocation - SLA

Configuring and Deploying a Private Cloud

Patch and Vulnerability Management Program

AHS Flaw Remediation Standard

Charter Business Desktop Security Administrator's Guide

CSUSB Vulnerability Management Guidelines CSUSB, Information Security & Emerging Technologies Office

Configuring and Deploying a Private Cloud with System Center 2012 MOC 10751

How To Use Qqsguard At The University Of Minneapolis

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

How To Use Adobe Software For A Business

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Tailored Technologies LLC

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.

Ovation Security Center Data Sheet

IBM Security QRadar SIEM Version MR1. Administration Guide

TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS

Upgrading Cisco UCS Central

Configuring and Managing Microsoft System Center Essentials 2010

Transcription:

Server Management Program Review / Training GOALS To Review SMP structure, requirements, logistics To increase quality and benefit of documentation Provide/review examples and upgraded templates Unit IT Managers are accountable for comprehensive application of SMP within the unit

SMP: Document Repository & Update Cycles SMP Portal is where all required documents are to be stored https://agrilife-smp.tamu.edu Updates for annual documents are due by Oct 31 st Monthly, Quarterly documents are due at end of each cycle Will be assumed content is always here and up to date

SMP: Document Naming Conventions Templates provided in Template Zip Do not change names Examples: AccountManagementLog.docx DisasterRecoveryPlan.docx Use Portal Checkout and Check-in Functionality (Demo) Up to 4 years of past documentation will be maintained for state record retention and audit requirements

SMP: Documentation Grouping Many units manage groups of servers with the same process and tools. For systems that are managed this way one document (e.g. Disaster Recovery) can be created to cover all servers with the same procedures Document should clearly list the DNS name for all the individual servers that the document applies to.

SMP: Procedures & Logs SMP consists of both Procedure documents and Logs Procedures should be written with enough detail to accommodate someone else performing the process (see examples) Logs should at a minimum identify who, when, what was performed and the associated server(s) Procedures require scheduled annual reviews to maintain familiarity and verify process viability with noted changes formally documented immediately

SMP: What Requires Documentation? The system will be SERVING a function to PUBLIC (i.e. web server, file server, video server, workstation with LAMP etc.) It is running a known server operating system (may require review of build/version edition information to determine) System is SERVING a function to INTERNAL user base (i.e. web server, file server, video server, etc.) Not a server but may still need account and patch management, firmware updates, etc. (i.e. NAS)

SMP: SERVER/DOCUMENT INDEX Each Unit should maintain updated Server/Document Index SERVER- INDEX.xlsx (see required template) Template facilitates SMP, MRT, ISAAC and System Audit Needs List Servers, Classify Server, fill in remaining detail Updates should be made immediately with any change in server consistency

SMP: Backup Procedure Documentation Goal : Protect specified data in a scheduled manner enabling quick and efficient restoration Procedures should identify all backup solutions, the associated hardware/software, data that is backed up, specific steps to setup the backup process and to recover the data Backups should be tested monthly and the recovery process tested annually with testing dates and results noted in log (DisasterRecoveryBackuplog.docx) Documented process of backup, recovery and testing procedures required (DisasterRecoveryPlan.docx)

SMP: Disaster Recovery Documentation Goal : Minimize negative operational impacts by identifying critical systems, prioritize their recovery, define steps to reconfigure and recover these systems to normal operation Procedures should include procuring replacement parts, access to necessary media and backups, steps for restoring/restarting systems and checking system/application functions Procedures should be tested annually with testing dates and results noted in log (DisasterRecoveryBackuplog.docx) Documented process of recovery and testing procedures required (DisasterRecovery.docx)

SMP: Account Management Documentation Only required for non-agnet Servers Must have documented Account Management Procedure including steps for account creation, change and removal (Example) Account Management template specifies minimum tracking information (AccountManagementLog.docx) necessary to log both creation and removal of accounts Reviews should occur to identify inactive (90 days) or former employee accounts potentially missed during off boarding Reviews are to be logged with changes noted per the account management log

SMP: Security Monitoring Goal : Review logs, etc. to identify unusual events that may indicate malicious activity Procedure should include steps for reviewing Failed login attempts Login attempts from foreign countries for legitimate accounts associated with faculty/staff not traveling overseas High resource consumption of disk space or high system processor utilization Large number of failed job executions Reviews should occur weekly for mission critical systems, monthly for non-mission critical systems with each review and its results logged (SecurityMonitorLog.docx) Documented review process required

SMP: Physical Security Goal : Monitor physical access to servers and network equipment Procedure should include steps for obtaining access to server room and whether escorted access is required If not using a key card swipe system must have a log sheet in room (PhysicalSecurityAccessLog.docx) List of those provided room access via cards/keys must be reviewed and renewal required at least once a year Documented process for obtaining access required (PhysicalSecurityAccessProcedure.docx)

SMP: Change Management Goal : Establish standardized, efficient methods for managing change Procedure should establish regimented steps for change requests spanning from the initial inquiry to notification of completion Changes must be logged (ChangeManagementLog.docx) when any of the following occurs on a server: Configuration change in hardware or software Relocation of a server Network configuration change Software installation, removal or reaffirmation (reaffirm need for software annually) Patch/updates applied to server if not using AGNET WSUS or Red Hat Subscription services

SMP: Confidential Information Identity Finder now available at no cost from sell.tamu.edu Scan should be performed annually at a minimum Each scan should be logged with findings and remediation steps noted (ConfidentialInfoScanLog.docx) Any violations must be logged and reported to AIT ISO immediately Servers persisting confidential information must be authorized by the ISO and TAMU System ISO, per System policy, prior to the storage commencing Identity Finder Installation available via AGNET domain on a scheduled basis

SMP: ISAAC Risk Assessment Process ISAAC REPORTS should cover ALL SERVERS and ALL WORKSTATIONS within your unit, no matter where they are located, funding source or owner. Unit IT Manager is accountable for comprehensive ISAAC assessment for unit. All units will be required to send completed reports to AIT for QA review 2 WEEKS PRIOR TO UNIVERSITY DEADLINE Any remediation resulting from ISAAC will be coordinated through the AgriLife ISO Starts September 1 and ends November 22 Due to AIT on NOVEMBER 8 th 2013

SMP: Patch Management Business owner or administrator, representing each server, must attend the monthly Information Systems Security meeting Critical patches/updates must be applied as identified Operating system and application software patches/updates must be applied and confirmed on a monthly basis Patch/update installation must be logged in the Change Management log (ChangeManagementLog.docx) for servers not using AGNET WSUS or Red Hat subscription services

SMP: Vulnerability Scanning and Remediation Goal : Perform scan on all systems to detect and remediate vulnerabilities Systems monitored by AIT Nessus scanner are provided with monthly report via email Campus systems not reachable by AIT Nessus scanner can either utilize the CIS Nessus scanner or if no active scanning being performed a documented Risk Assessment Review report must be created Vulnerabilities should be reviewed, remediation scheduled and results logged (VulnerabilityScanLog.docx) Generally less than 30 days For more high/critical ASAP timeframe Accountabilities of Unit IT Manager Facilitator for entire unit even if not managing a server Must assist or source solutions to resolve vulnerabilities of all unit servers Alternatively, recommend to unit head alternative solution/resource Prepare for increasing scrutiny and potential shutdown actions

Workstation Management: WSUS Windows Server Update Service (WSUS) available to all departments and centers with update policy selected by adding computer to a group Three policy setting options available via groups Default: automatic patch download, install and reboot WSUS-NoReboot: automatic patch download, install with manual reboot WSUS-Servers: automatic patch download, manual install and reboot Note: Do not rename, delete or remove any of the groups Note: If computer is renamed it must be re-added to the appropriate group (other than default group)

Workstation Management: WSUS Default for all policies Computer checks for updates 3 am nightly If computer is not powered on at 3 am service will attempt updates 2-3 hours after the system is powered on - Under these circumstances options 1 & 2 automatically install updates after download and then prompt for reboot on hourly basis. User has option to defer reboot. Automated Report Emailed third Tuesday of each month Provides patch status for computers that have checked in within the last 30 days and that have outstanding patches

Workstation Management: WSUS Report entries include computer name,.. Security bulletin (SB) is a notice, sent upon release, detailing the release date, issue(s) addressed, actions to take, software impacted, etc. (Example: MS13-047 13 indicates release in 2013, 47 indicates sequence number of patch) Knowledge Base (KB) is same content as security bulletin but filed in MS system for reference and may have additions over time to reflect new data, etc. (Either SB or KB may be Googled to view the specific details) Severity rating indicates the impact of vulnerabilities addressed by patch Status indicates progress of patch install for system 12-12 - 2012

Workstation Management: WSUS Severity Ratings Critical Vulnerability whose exploitation could allow code execution without user interaction. (apply immediately) Important Vulnerability that could result in compromise of confidentiality, integrity or availability of user data or processing resource. (apply asap) Moderate Vulnerability whose impact is mitigated significantly by factors such as authentication requirements, etc. (apply time dependent on factors impacted) Low Vulnerability s impact mitigated by characteristics of affected component Unspecified Vulnerability does not have a severity rating 12-12 - 2012

Workstation Management: WSUS Status Not Installed An attempt to install the patch has not been made at time of report generation. Downloaded Update downloaded and is sitting on system waiting to be installed Installed Pending Reboot Update downloaded, installed and requires reboot to complete the installation Failed Update downloaded and an attempt made to install but install failed 12-12 - 2012

Workstation Management Local Account Report Monthly Automated Delivery for AGNET Domain Systems IT Managers should review Remediate any extraneous, guest or unused accounts 12-12 - 2012