LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-24-2008, 06:34 AM   #1
samengr
Member
 
Registered: Jan 2008
Posts: 59

Rep: Reputation: 15
Linux Security Policy Document


Hi to All Linux gurrus

I need to formalise the security procedures for the linux servers. I want to make a policy document so that if i can apply this policy to the new servers.

1. Outline documentation

I have a few headlines that can be added to the document, feel free to add, edit and delete as you see fit.

a) Account Management

i) Password policy

b) Services

c) Patching / Updating

d) Kernel Updates

e) Log monitoring / management

f) Intrusion Detection Systems


Can any body help me in this regard?
I will appericiate if someone can highlight more areas.

Thanks

Sam
 
Old 01-24-2008, 08:40 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by samengr View Post
I need to formalise the security procedures for the linux servers. I want to make a policy document so that if i can apply this policy to the new servers.
Maybe a minorr nit but there's a difference between policies and procedures. Policies are plans or sets of rules (requiring adherence and penalising offences) to reach a goal. Like "It's kinda time we sorta work on this HIPAA / SOX / Basel II thing." Procedures (SOP's) are sets of specific steps to perform tasks (with regard to standards, quality, efficiency). Like "Do x, y and *then* Z or this application will b0rk."

Wrt hierarchy see who owns (pays for) the servers and services (home, workplace, colocation), if there's any policies and SLA's in place and such. For instance if there are seven servers located in two data centres that together are "the application" the data centre has to adhere to the network policy of the fat pipe supplier. One level up you are bound by contract to what the data centre sets as policies. On top of that your customers have to adhere to what you set as policies. What I'm saying is that wrt boundaries in policies you don't have to supply what was already defined by the colo provider and in procedures you don't have to supply what is in your SLA with that provider.

Such an assessment is also good to uncover problems. Like if you have an SLA with your colo people but they won't handle incidents the way you want it. Then it's your chance to set an incident handling policy and the accompanying handling and recovery procedures. Or if you're for example a reseller. You'll have lots of newbie customers that play with deprecated software which threathens your servers, other servers (spam, bots, probes) and your company image. You want to make your AUP point out that it's unacceptable, then you follow that up with a formal policy and procedures on how to check and what to do. If you got that you can also make them pay (money, I mean) for added value services since you can guarantee "better" integrity, data safety and stability (to some extent). OTOH things change if these boxen are part of a company or institution network. They should already have policies in place depending on what they have to adhere to so you can focus on specific server and application policies and procedures embedded within those existing policies.

Wrt formalising there's lotsa std docs on the 'net but it is *a lot*. If you really want to make formal policies you should invest time and read this OR this OR this.


Quote:
Originally Posted by samengr View Post
1. Outline documentation

I have a few headlines that can be added to the document, feel free to add, edit and delete as you see fit.

a) Account Management

i) Password policy

b) Services

c) Patching / Updating

d) Kernel Updates

e) Log monitoring / management

f) Intrusion Detection Systems

Some phrases to think about: generic server and network AUP, account management, application testing, application testing, maintenance and rollout, user-requested custom configuration testing, backup and rollback procedures, performance monitoring, redundancy or spare activation, server maintenance, incident handling and risk management.


Having read all this maybe step back a bit and think about your day to day work with those servers and the logged incidents (you do keep admin logs, right?) and how you would want to formulate a simple goal for that. That's all it needs to start off with as all journeys start with a first step.
 
Old 01-24-2008, 10:05 AM   #3
farslayer
LQ Guru
 
Registered: Oct 2005
Location: Northeast Ohio
Distribution: linuxdebian
Posts: 7,249
Blog Entries: 5

Rep: Reputation: 191Reputation: 191
Some more resources and reading materials..

Site Security Handbook rfc 2196 (1997)

ISO/IEC 17799:2005
Quote:
ISO/IEC 17799:2005 establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. The objectives outlined provide general guidance on the commonly accepted goals of information security management. ISO/IEC 17799:2005 contains best practices of control objectives and controls in the following areas of information security management:

* security policy;
* organization of information security;
* asset management;
* human resources security;
* physical and environmental security;
* communications and operations management;
* access control;
* information systems acquisition, development and maintenance;
* information security incident management;
* business continuity management;
* compliance.

The SANS Reading Room has a lot of materials you can work from as well.. SANS Best practices

and the NIST has a Security Checklist repository Information you can use to ensure you are doing the baseline security on your Systems..
Quote:
The National Checklist Program (NCP) is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications. NCP is migrating its repository of checklists to conform to the Security Content Automation Protocol (SCAP). SCAP enables standards based security tools to automatically perform configuration checking using NCP checklists.

NCP contains 144 checklists covering 144 products.

Last edited by farslayer; 01-24-2008 at 10:07 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Can't mount usb -- security policy? David the H. Linux - General 1 08-16-2006 08:44 PM
security policy iptables Ammad Linux - Security 2 11-14-2005 06:15 AM
Domain Security Policy talkinggoat Linux - Networking 0 10-10-2003 11:25 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:12 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration