Server Security Checklist: Server Identification and Location
Server Security Checklist: Server Identification and Location
2. All non-removable media is configured with file systems with access controls enabled. (1.2)
13. There is a documented process for routine log monitoring and analysis. (3.2)
Where is it documented? ____________________________________________
14. Reviews are conducted periodically to ensure effectiveness of the server logging process. (3.3)
How often? (At least monthly): _________________________
15. There is a schedule for log monitoring of the server. (3.4)
Where is it documented? _________________________________________
16. Logging has been configured to include at least 2 weeks of relevant OS/application information. (3.5)
The logging elements include:
All authentication
Privilege escalation
User additions and deletions
Access control changes
Job schedule start-up
System integrity information
Log entries should be time and date stamped
17. Intentional logging of private information, such as passwords, has been disabled. (3.6)
18. Logging is mirrored in real time and stored on another secure server. (3.7)
20. There is a documented change control process for system configurations (4.2)
Where is it documented? _____________________________________
21. All unused services are disabled. (4.3)
22. If available, anti-virus software and definitions are current and up-to-date. (4.4)
33. The ISO vulnerability scanner is not blocked specifically or permanently whitelisted. (5.3)
34. A systems/server administrator is authorized to perform scans when approved by the (5.4)
system owner or the ISO.
Is there anyone else authorized to perform scanning?(Y/N)________
If yes, who? ________________________________________
35. Confirm only ISO-approved security assessment tools are used for scanning (acceptable tools
are listed at: https://www.rit.edu/security/content/technical-resources. (5.7)
37. All manufacturer and default passwords have been changed. (6.2)
38. Strong authentication has been configured for all users with root or administrator system privileges.(6.3)
Refer to the ISO website for a list of strong authentication practices.
39. Access Control has been configured to allow only authorized, authenticated access to the system (6.4)
and its applications and data.
40. There is a documented process for granting and removing authorized access (6.4)
Where is it documented? ____________________________________
41. Generic or persistent guest accounts allowing user interactive logins have been disabled. (6.4)
(Service accounts are excluded from this requirement.)
43. All servers with Operationally Critical data have documented back-up, system and application (7.1)
restoration (including configurations) and data restoration procedures to support business
continuity and disaster recovery planning.
Where is this documented? ____________________________________
44. Back-up procedures are verified at least monthly through automated verification, customer (7.1)
restores, or through trial restores.
How often are they verified? _____________________________
45. Backups are not being stored solely in the same building where the Operationally Critical (7.1)
data is located.
46. Backups have been made readily accessible. (7.1)
47. Measures to transmit server back-ups securely have been put in to place. (7.1)
48. Back-up media is compliant with the Portable Media Security Standard. (7.1)
Servers that do participate in this type of computing should employ appropriate and documented
safeguards to protect RIT Confidential Information and access to RIT internal networks.