22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

112 Lotus Security Handbook<br />

become a carrier of worms, viruses, or possibly even a conduit or bridge into your<br />

internal network. If you permit workstations connected to your internal LAN to<br />

also use dial-up services outside your control, those workstations can potentially<br />

form a network-level bridge between your internal “protected” network and the<br />

outside unfiltered Internet. So remember to include acceptable use of modems in<br />

your security policy. This is in addition to standards for workstation virus scanning<br />

software updates and personal firewalls and the means to keep the workstation<br />

security measures up to date.<br />

Information about sources of vulnerability and updates is usually available from<br />

operating system vendors and application software vendors, but you should not<br />

rely on vendor sources as your sole source of information. One of the best<br />

resources on security vulnerability issues is the CERT Coordination Center. Get<br />

the latest information from their Web site, which is updated frequently, at:<br />

http://www.cert.org/<br />

The resources required to perform patch management on servers will vary<br />

depending on the size of the organization, the number of different operating<br />

systems, and the number of applications. Patch management of workstations will<br />

vary widely in the resources needed, depending on whether or not a central<br />

software distribution mechanism is implemented, among other factors. Updates,<br />

patches and other “hotfixes” can be pushed to workstations using traditional<br />

software distribution tools, or specialized patch management products, such as<br />

Patchlink Update (www.patchlink.com), BigFix Patch Manager (www.bigfix.com),<br />

Security Update Manager (www.configuresoft.com), LANguard Network<br />

(www.gfi.com), and others.<br />

Record activity for audit and reporting<br />

No security architecture is immune from unauthorized access attempts. Every<br />

system should anticipate attempts to circumvent the controls designed to protect<br />

the enterprise, and every subsystem should have auditing as a component.<br />

Following are the features that should be incorporated:<br />

1. A log of system activity must be available in case an investigation is required<br />

to determine actual use (or misuse). Logs should be stored on a system that<br />

is separate from the system generating the log, and is physically located<br />

within a protected network zone. The log must be retained and available to<br />

security administrators for a number of days determined by the organization’s<br />

business security standards and procedures. We recommend keeping activity<br />

logs for at least 60 days, as often an incident investigation needs to <strong>cover</strong> a<br />

period of several weeks.<br />

2. All access attempts to systems should be logged. Components must have the<br />

ability to create access, system, resource, and activity logs. Exceptions to<br />

compliance should be clearly described in the organization’s security policy.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!