Secure the edge with a good firewall/threat management gateway and intrusion detection/prevention system
Use anti-virus and anti-malware software (including on non-Windows systems) and keep definitions updated
Implement security auditing/monitoring to detect attempted breaches
Harden systems by turning off unnecessary services
Close unused ports
Restrict physical access to the systems
Restrict administrative/root access to those who really need it; on UNIX systems, restrict root access to secure terminals
Implement file level permissions; on UNIX systems, partition the file system and use read-only partitions for storing files that don’t change often, and use ACLs (Access Control Lists) for complex permissions management
limit the access processes have on the file system by using the chroot and ulimit interfaces 
Enforce strong password policies
In high security environments, require two-factor authentication
Use SSH (Secure Shell) for remote command line access
Use encryption: to protect files on the drive, to protect data crossing the network, to protect the operating system from unauthorized access
Implement a public key infrastructure to issue digital certificates
No comments:
Post a Comment
Thank you soo much for your comments..