- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Need advise from person who have experience with s...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2003 10:08 PM
03-20-2003 10:08 PM
Need advise from person who have experience with security auditing.
I need to goto security auditing with external auditor.
any advise in term of documents we should have / checklist log , etc.
Not technial thing that we already have a lot in this forum.
Thanks in advance,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2003 10:20 PM
03-20-2003 10:20 PM
Re: Need advise from person who have experience with security auditing.
I our recent audit we are asked to show about the users created in each machines and procedure to create(not the command)
We had checklist for each machines for users craeted in each machines that is approved by my manager stating the reason
checklist for applying the patches(how often and proof)
we should have the logs(system logs) for atlest last 3 months of each machine.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2003 10:30 PM
03-20-2003 10:30 PM
Re: Need advise from person who have experience with security auditing.
1. Password strength and how often is password change forced. Password strength meaning to enforce non dictionary words, upper and lower case letters, pucntuation etc.
2. Any modems attached and is there a getty on those ports.
3. Do you have monitoring scripts that run out of cron.
4. Does /etc/securetty exist with only "console".
5. Are you using tcp wrappers.
6. Are all unused ports disabled in /etc/inetd.conf
7. Is root and other system accounts in /etc/ftpusers?
8. Do you have a script to search for the presence of a + in everyones .rhosts file.
9. Do you have a system recovery policy and is it tested? i.e. Ignite, fbackup etc.
10. All all users in /etc/password current employees
11. Only allow login with specific users account names, not application like dba, oracle etc. Users must first login then su to that account.
Hope this short list gets you a step up on auditor.
Good Luck
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2003 10:40 PM
03-20-2003 10:40 PM
Re: Need advise from person who have experience with security auditing.
Hope I am eligible to answer
1) List of security patches of the OS involved at the customer site.
2) Documents of Known vulnerabities and bugs on OS involved from www.sans.org , www.cert.org etc. These documents can be used to reinforce the your security recommendations after audit
3)Documents authorizing you for Security auditing. very much needed :-)
4)Documents on setup details and if possible configuration of your Customer servers , applications .
Other recommendations are always consult the software people on the site before enforcing or changing any file or directory permissions.
If the site is connected to Internet , then follow a very stringent security auditing and put across strong recommendations.
Create a final report of vulnerabilties classifying them according to the severity. And let the recommendations to follow against every vulnerability.
regards,
U.SivaKumar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2003 10:41 PM
03-20-2003 10:41 PM
Re: Need advise from person who have experience with security auditing.
Hope I am eligible to answer
1) List of security patches of the OS involved at the customer site.
2) Documents of Known vulnerabities and bugs on OS involved from www.sans.org , www.cert.org etc. These documents can be used to reinforce the your security recommendations after audit
3)Documents authorizing you for Security auditing. very much needed :-)
4)Documents on setup details and if possible configuration of your Customer servers , applications .
Other recommendations are always consult the software people on the site before enforcing or changing any file or directory permissions.
If the site is connected to Internet , then follow a very stringent security auditing and put across strong recommendations.
Create a final report of vulnerabilties classifying them according to the severity. And suggest the recommendations to follow against every vulnerability.
regards,
U.SivaKumar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2003 12:26 AM
03-21-2003 12:26 AM
Re: Need advise from person who have experience with security auditing.
http://sabernet.home.attbi.com/papers/hp-ux10.html#1.3
Regards,
Sergejs
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-23-2003 10:36 AM
03-23-2003 10:36 AM
Re: Need advise from person who have experience with security auditing.
written down desaster Recovery Procedures, stored onsite and as a backup in a safe-deposit at a bank some 10km away from onsite location.
Regular check-out and check-in of Backup Media to offsite locations. Access control for this offsite media. Validation procedure for offsite media.
Checklists to be run against any component involved to dialin of any type (routers, modems, isdn cards). This includes checking for security patches and signing a checklist once a month as well as e-Mail notifications for critical-patches.
And of course the regualar stuff you find all across this forum or the Internet.
I have to highlight my favorite here -> Default Users and passwords.
And another important one:
Checklist what to do if either
a) Managemant person
b) Sysadmin person
c) any other person
leaves the company in
1) normal way
2) unnormal way (i.e. has to clean his/her desk under observation)
You will not beleave how improtant this one could be....
Good luck for your audit
Volker
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-23-2003 12:53 PM
03-23-2003 12:53 PM
Re: Need advise from person who have experience with security auditing.
There is no end to the securing a system. Below are some of the guidelines.
1. Trusted system and password controls like expiry, bad attempts etc.,
2. Regular password checking by using "crack".
3. Limiting shared accounts and their direct logins. Minimizing the number of accounts.
4. Disabling ftps
5. Using encrypted data trasmission by secure shells
6. Disabling unnecessary services including ndd's parameters.
7. Restricting the allowed services using inetd.sec or tcp_wrappers
8. File and directory permissions
9. Accounting
10. Regular Scans both network and system.
11. Standard System layouts
12. Security Patches and maintenance of documentation
13. Minimizing the people knowing root passwords
-Sri
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-23-2003 05:44 PM
03-23-2003 05:44 PM
Re: Need advise from person who have experience with security auditing.
Here is the list:
Bastille Security hardening
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA
Perl which the above needs.
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL
Security Patch Check
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA
TCP Wrappers
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP
IDS/9000 (Intrusion Detection Sytstem)
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=J5083AA
Get all these products working you'll be quite secure.
Secure shell
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA
I'm attaching Chris Vale's doc on exchanging public keys with for the secure shell product. If you have this stuff running and can talk about it intelligently with the auditors, they'll have some nice things to say in their report.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-23-2003 06:29 PM
03-23-2003 06:29 PM
Re: Need advise from person who have experience with security auditing.
I guess I can add to the list:
Check some file permissions on OS filesystems
find / /opt /usr -xdev -type f -perm 666
find / /opt /usr -xdev -type f -perm 777
find / /opt /usr -xdev -type d -perm 777
The man and cat directories should be ok.
Make sure all mountpoint directories do not have permissions any greater than 755
Check 'root's umask, should 022
You should have 'nosuid' for most, if not all mountpoints (excl. /usr and /opt)
Sticky bit setting for /tmp and /var/tmp
Check where the 'root' home directory is. Should NOT be in /
It is suggested that /root isa good place as it is not in / and it is in the / filesystem.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-23-2003 06:32 PM
03-23-2003 06:32 PM
Re: Need advise from person who have experience with security auditing.
We went through a security audit last year. They will be asking you a lot of questions about your day to day procedures. How you handle regular activities such as password changes, new user requests, etc. They will ask about your change control procedures. If you are about to go into an audit, there probably isn't time to change much of your standard operating procedure. Probably it is better just to head into it and see what recommendations they come up with. Some may be a bit funny, but they might come up with some good stuff also. We survived ours without any real problems.
Good luck!
JP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-24-2003 12:35 AM
03-24-2003 12:35 AM
Re: Need advise from person who have experience with security auditing.
One point not mentioned yet:
Security officers might be interested in the protection of your data centre. (peoples access,fire and water protection ,power supply etc.)
Regards
Rainer
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-24-2003 12:36 AM
03-24-2003 12:36 AM
Re: Need advise from person who have experience with security auditing.
I specialise in IT Security for a large European Bank, and work closely with the auditors. I would be very suprised if they are in anyway technical, and so I wouldn't worry too much about the latest patch or security setting.
There questions are more likely to be along the lines of:
How do you know who has access to what, and what do you do when a person leaves?
What measures do you take to ensure that the machines have not been compromised etc.
If a security breach occurred, what logging (evidence) is available, etc...
The points that they tend to be the most keen are:
Your security policy is legally enforceable and conforms to the general standard for your industry/sector.
Your policy accurately reflects how people actually behave, and it is generally enforced.
You have procedures that people actually use and understand.
I hope this helps.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-24-2003 12:53 AM
03-24-2003 12:53 AM
Re: Need advise from person who have experience with security auditing.
I think you can find some usefull links at:
http://www.ict-audit.com/
Gideon.
My personal experience is that the management focusus on easy wins, and "forgets" about the bigger picture.