Servers are frequently targeted by attackers because of the value of their data and services. For example, a server might contain personally identifiable info. that could be used to perform identity theft. This document is intended to assist organizations in installing, configuring, and maintaining secure servers. More specifically, it describes, in detail, the following practices to apply: (1) Securing, installing, and configuring the underlying operating system; (2) Securing, installing, and configuring server software; (3) Maintaining the secure configuration through application of appropriate patches and upgrades, security testing, monitoring of logs, and backups of data and operating system files. Illus.An example is a laptop that has a remote access service enabled so that IT support staff can remotely maintain the laptop and perform troubleshooting. 2 Additional information on environments is available from NIST SP 800-70, Securityanbsp;...
|Title||:||Guide to General Server Security|
|Publisher||:||DIANE Publishing - 2009-05-01|