Page 25 - Security+ (635 notes by Nikkhah)
P. 25

Application hardening

            401- Software applications on desktops and servers should be kept up to date with the latest

            service packs, hotfixes, and security patches.
            402- Security patches, hotfixes, or service packs must be thoroughly tested before installation.

            403- Updates that provide only cosmetic changes need not be installed.

            404- Appropriate access should be configured on applications.
            405- Antivirus software should be run regularly with updated virus signatures. Web servers

            406- The NOS must be secured properly, and it should be kept up to date.
            407- Antivirus software should be used with updated virus signatures.

            408- A web service should not be left in its default configurations.
            409- Named accounts should not allow anonymous access to web servers.

            410- User  authentication  should  be  processed  using  strong  protocols,  and  all transactions

            should be encrypted for e-commerce web servers.
            411- Web servers should be placed inside a Demilitarized Zone (DMZ).



            Email servers

            412- The NOS over which the email services are running must be secured properly.
            413- Antivirus software should be run regularly with updated virus signatures.

            414- SMTP relay should be disabled as it can cause DoS attacks.

            415- Users must be careful not to open suspicious attachments that may contain email viruses.
            416- Usage of HTML email should be avoided.

            417- Internet Messaging (IM) outside the organization should be monitored.

            418- Email servers should be placed inside a DMZ.



            FTP servers
            419- FTP servers are permanently connected to the Internet and attract malicious users.

            420- Filesystem security should be appropriately configured.
            421- Access control, authentication, and authorization systems should be in place.

            422- Audit policy should be implemented and security logs should be reviewed regularly.

            423- FTP servers should be placed inside a DMZ.







                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 23
   20   21   22   23   24   25   26   27   28   29   30