- Secure the edge with a good firewall/threat management gateway and intrusion detection/prevention system
- Use anti-virus and anti-malware software (including on non-Windows systems) and keep definitions updated
- Implement security auditing/monitoring to detect attempted breaches
- Harden systems by turning off unnecessary services
- Close unused ports
- Restrict physical access to the systems
- Restrict administrative/root access to those who really need it; on UNIX systems, restrict root access to secure terminals
- Implement file level permissions; on UNIX systems, partition the file system and use read-only partitions for storing files that don’t change often, and use ACLs (Access Control Lists) for complex permissions management
- Enforce strong password policies
- In high security environments, require two-factor authentication
- Use SSH (Secure Shell) for remote command line access
- Use encryption: to protect files on the drive, to protect data crossing the network, to protect the operating system from unauthorized access
- Implement a public key infrastructure to issue digital certificates
No comments:
Post a Comment
Thank you soo much for your comments..