22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

preparation of the necessary updates on a customized CD or tape before<br />

installation.<br />

Once the OS is installed with current updates, it is important to keep the system<br />

up to date. There are update services offered by the major OS manufacturers<br />

(such as the Red Hat up2date tool and Microsoft’s Windows Update Tool). These<br />

tools must be used carefully, and you should understand what a specific patch<br />

acquired with the tool will do to the system before you install it.<br />

Lock down the services<br />

The operating system is only a small part of an IT system. Additional services<br />

that are bolted on can provide additional functionality right out of the box, but on<br />

the other hand, they can cause some security headaches. For example, one of<br />

the most well-known services for the Windows Server OS is Internet Information<br />

Server (IIS), which has been the source of a great number of well-publicized<br />

exploits.<br />

Just like the OS, all services and third-party programs on the computer should be<br />

checked to ensure that they are the most current versions and that they are safe<br />

to use. Oddly enough, not all System Administrators understand this principle<br />

and make efforts to remove unwanted services; some don’t even know which<br />

services their systems are running.<br />

While we deal with specific tools and techniques in this chapter, a quick and easy<br />

way to close some vulnerabilities is to check which communication ports are<br />

listening for incoming data. This is done using the following command at the<br />

command prompt:<br />

netstat -an<br />

As well, tools such as Nessus, Nmap, and Stealth can quickly provide a<br />

snapshot of the IT system and what potentially vulnerable services are running in<br />

the background.<br />

Define a proper baseline<br />

Once the IT system is patched and locked down, an important step that should<br />

be taken before opening it to the world is to establish a proper baseline for the IT<br />

system.<br />

This is mostly to ensure that complete documentation of the changes that were<br />

carried out on the IT system exists. Any changes made to this baseline can be<br />

verified and appropriate security measures taken. This also sets up a standard in<br />

terms of IT system configuration in the organization and any corrections that<br />

have to be applied can be done quickly and uniformly, avoiding the concept of a<br />

“weakest link.” (That is, a system that differs significantly in its base configuration<br />

Chapter 9. Server hardening 355

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!