SITS:Vision Annual the Hilton Deansgate Hotel, Manchester Mike Fisher – Technical Services Team Leader Security and Hosting 12-13 July 2011.

Slides:



Advertisements
Similar presentations
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Advertisements

Thoughts on Technology Issues for Small Business Implementing Technical Safeguards to support Your Policies.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Session 11: Security with ASP.NET
Chapter 7: Using Windows Servers to Share Information.
Module 13: Configuring Availability of Network Resources and Content.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter 13 – Network Security
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Module 4 : Installation Jong S. Bok
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Module 11: Securing a Microsoft ASP.NET Web Application.
Module 1: Implementing Active Directory ® Domain Services.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Services Configuration
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Configuring and Deploying Web Applications Lesson 7.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Computer Security Sample security policy Dr Alexei Vernitski.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
1 Example security systems n Kerberos n Secure shell.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
ArcGIS for Server Security: Advanced
Chapter 7: Using Windows Servers
3.1 Types of Servers.
Configuring Windows Firewall with Advanced Security
Chapter 5 : Designing Windows Server-Level Security Processes
3.1 Types of Servers.
Welcome To : Group 1 VC Presentation
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Utilize Group Policy Terminal Server Settings
What Is Sharepoint? Mohsen Ashkboos
Web Servers / Deployment
Web design for small busniess
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Preparing for the Windows 8.1 MCSA
Presentation transcript:

SITS:Vision Annual the Hilton Deansgate Hotel, Manchester Mike Fisher – Technical Services Team Leader Security and Hosting July 2011

Introduction ■We have undertaken a review of all our software with specific reference to security ■As a result we have: ■Made changes to the applications to enhance security ■published security recommendations for all Maytas and eTrack configurations, some of these are things we have always setup as standard ■Made general infrastructure recommendations around the applications and associated servers

Security Recommendations ■We have published a document (sent with each release) outlining our recommendations for: ■Database Servers ■Maytas 3 ■Maytas 5 ■eTrack Online ■eTrack Offline ■Web and Application Servers ■General Network Setup

Database Server ■The Maytas 3 user account ■Configured with a default password ■Can be changed to conform with local IT policies on passwords ■Each application must be told of the password change ■Database Server location ■Should sit secured within a LAN ■Must not public face ■Database Encryption ■Certain contracts specify that databases must be encrypted ■Tribal practice database disk level encryption

Maytas 3 ■Application directory security ■Can be locked down to stop users accessing the application files ■Some permissions are required and are documented ■Extra important when Maytas 3 is run over a terminal server ■Maytas 3 User Editor ■Ensure permissions set are as required ■The ‘stever’ account… ■Password Policies

Maytas 5 ■M5 Data Services ■When using a file store switch the user to a domain account with appropriate permissions ■Services Access Groups ■Restricts who can run a ‘First Time Setup’ against the service ■Client Machine Encryption ■To encrypt any data local to the machine ■Password Policies

eTrack General ■The eTrack evidence file store ■Location and user access ■web.config encryption ■System Configurations ■Blocked File Types ■Account Lockouts ■SSL Server Settings

eTrack ■eTrack Online ■The IIS user ■Application Directory Security ■Configurable Session Timeouts ■Password Policies ■eTrack Offline ■Local Data and Evidence files ■Laptop encryption ■Password Policies

General (Applicable to All) ■Password Policies can be set in the database which then apply to all user accounts ■Password expiration times ■Options for ■Password length ■# of CAPITAL letters ■# of lowercase letters ■# of numeric ■# of Special Characters

Network Diagram

Tribal Data Policies When transmitting data to Tribal: The local Tribal office will inform customers of a Tribal FTP site to which they can electronically submit data. A username and password will be issued to each customer as required. It is the responsibility of the customer to install and manage the necessary software to transmit and receive data to Tribal. Files sent to Tribal must be encrypted to at least the FIPS140-2 standard. This standard is not met by Winzip or 7-Zip; two widely used commercial compression/encryption packages. Tribal use an encryption product, SecureZip** for the secure encryption of files, which meets the FIPS140-2 standard when used correctly.

Hosting ■As part of our hosted service we manage all application upgrades as standard ■The environment and our hosting team conform to ISO27001 standards on security ■We can supply a hosted service from 1 user upwards h osting any combination of M3, M5 and eTrack ■We build dedicated farms for larger setups ■Currently we run: ■The MAYTAS shared service for smaller customers (< 20 users) ■10 designated farms for larger organisations ■A separate DWP security cleared farm ■Currently our largest environment has upwards of 2500 users

SITS:Vision Annual the Hilton Deansgate Hotel, Manchester