Server Security Policy

Slides:



Advertisements
Similar presentations
OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION
Advertisements

Example policy elements and their role in bandwidth management and optimisation.
Road Map for Audit Preparation FRCC Compliance Workshops September / October 2008.
Center for P – 20 Safety and Security Campus Safety.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
6-1 Full and Fair Reporting Electronic Presentation by Douglas Cloud Pepperdine University Chapter F6.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Information Security Policies and Standards
CST 481/598 x.2.  Broad overview of policy material  What is a “process”  Tiers (not tears) Many thanks to Jeni Li.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
95752:11-1 Security Policy :11-2 Policy Set of detailed rules as to what is allowed on the system and what is not allowed. User Policy System Policy.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Network security policy: best practices
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
CSIS Database Security, Dr. Guimaraes Adapted from Afyouni, Database Security and Auditing Database Auditing (Ch. 7) Overview of Auditing Overview.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 5 HIPAA Enforcement HIPAA for Allied Health Careers.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
1 PARCC Data Privacy & Security Policy December 2013.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
PROGRESS ON THE IMPLEMENTATION OF AUDIT RECOMMENDATIONS FOR 2014/15: INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) 1 Briefing presentation to the Portfolio.
Information Security tools for records managers Frank Rankin.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Washington Bankers Association Executive Development Program Audit and Compliance Internal Audit and Monitoring: The Continuous Program Cycle Presenter:
Overview of Tampa Electric’s Compliance Program APPA Reliability Standards and Compliance Program January 10, 2007.
Professional Codes of Ethics
Data Protection Regulation
Presented by Chris Backo
Information Technology (IT) Audits
Security Policies.
What Does GDPR mean for you
Developing an Effective Ethics Program
Information Assurance Policy and Management
Learn Your Information Security Management System
Data Protection Act and Other Laws
Administrative Law nd Year – Law Faculty
What is Policy? Julie M. Slavens Indiana School Boards Association
Security Policies.
Safety Accountabilities
Introduction to Networking
Policy and Procedure Manual
IS4680 Security Auditing for Compliance
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
A+ A+ CORPORATION PRESENTS: INFORMATION TECHNOLOGY DEPARTMENT
Securing and Protecting Citizens' Data
Background First ERP written in 1991 Revised in 1998
County HIPAA Review All Rights Reserved 2002.
Colorado state university-pueblo policy and administration (PA)
OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION
Chapter 8 Developing an Effective Ethics Program
General Data Protection Regulations 2018
IS4680 Security Auditing for Compliance
Record your QUESTIONS as your read.
Whose Job Is It? Responsibility for Laboratory Safety and Security
Uniform Guidance and Grants Accounting
{Project Name} Organizational Chart, Roles and Responsibilities
Basic Systems Management Employing Security Policies
Presentation transcript:

Server Security Policy By Thomas Jenkins

Background This policy is created to keep a companies files and data safe. It is made up of rules and regulations that regulate the use of the company’s servers and internal networks. All employees of that company must follow this policy. If policy is upheld, it will keep their servers secure. Each individual company creates their own policy.

But, SANS provides a policy that they think is the best way to keep a server secure. SANS makes this policy available on their website and will allow a company to put their name in the policy and adopt it.

Server Security Policy: 1.0 – Purpose - The purpose is to establish standards for the configuration of server equipment. This policy will limit unauthorized access to the company’s information. 2.0 – Scope - This scope tells what company falls under this policy and what equipment used also falls under this policy. 3.0 –Policy

3.1 – Ownership and Responsibility. - There should be a group that runs the server for said company. They should monitor it and keep it up to date. 3.2 – General Configuration Guidelines. - Guidelines that the administrator group should follow while configuring the server. 3.3 – Monitoring. - Server should be monitored for security issues and these issues should be recorded. Security issues should be reported to management and resolved.

3.4 – Compliance. - Audits will be performed on a regular basis to make sure server is running correctly. Findings will be reported to support staff for remediation or justification. 4.0 – Enforcement. - Any employee found violating this policy may be subject to disciplinary action, up to and including being fired. 5.0 – Definitions. - DMZ- demilitarized zone- A network segment external to the corporate production network. - Server-.

6.0 – Revision History. - History of all revisions will go here.