Page 506 - StudyBook.pdf
P. 506

490    Chapter 8 • Infrastructure Security: System Hardening

             into their environments, to ensure that they have done everything possible to elim-
             inate a breach or attack.
                 The following section looks at the types of actions security professionals must
             take to limit or reduce attacks, accidental damage, or destruction through their net-
             works. It also discusses recommendations for the appropriate application, timing,
             and installation of updates to the firmware being used and to the OS in the net-
             work device.Additionally, recommendations and best practices for the configura-
             tion of network devices and whether there is a need to disable or enable services
             and protocols within a network scope are explored. Finally, recommendations and
             procedures for establishing appropriate access control levels for devices and systems
             within a network are discussed.
             Updates (Firmware)


             Firmware updates, like software updates, are provided by the manufacturer of the
             hardware device being used.These updates generally fix incompatibility issues or
             device operation problems, and should be applied if the update involves a repair for
             an existing condition, or if it will make the equipment more secure, more func-
             tional, or extends its operational life. It is always necessary to install and test
             firmware updates in a non-production environment, to verify that the update con-
             tains the necessary repairs and benefits that are needed.After sufficient testing of
             the update and its functionality, it can be installed on other devices of the same
             type, as appropriate.

             Configuration

             Configuration of network devices (such as routers and switches) with default instal-
             lation settings, leaves a system extremely vulnerable. It is of paramount importance
             that administrators understand the limitations of default settings. Ideally, configura-
             tions should be tested and assured prior to implementation of the devices on a live
             network. Often, basic device configurations are set for convenience and not for
             control and security. It is easier to operate some devices with just the default set-
             tings, but in many cases, there is a corresponding loss of security.
                 Improperly configured or improperly secured devices left with default configu-
             rations will draw attackers if connected to the Internet. It is important to under-
             stand the ramifications of the settings made on any network device connected to a
             foreign or uncontrolled network.







          www.syngress.com
   501   502   503   504   505   506   507   508   509   510   511