Question

The Linux servers will be composed of web servers, user servers, log servers and database servers(however,...

The Linux servers will be composed of web servers, user servers, log servers and database servers(however, remember that no matter what type of server that you are building, security still needs to be put in place.). How will you solve it as a new hire ,technically and securely

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Building Linux server (web servers, user servers, log servers, and database servers) security, technically and securely.
* The first step after creating or installing a server or its OS is setting up security on it to prevent hackers from obtaining unwanted access.
* Basically, it requires to harden the security on the Linux server.
* On the other hand, a Linux server is secure by default to much extent, as it has in-built security model in general. Also, Linux is designed and developed based on the least privileged access model.
* It requires minimal installation of packages for security purposes. It requires to purge any unwanted packages.
* One could, in general, go for cloud, or specifically for public cloud service such as Amazon Web Services (AWS) and create instances or Virtual Machines (VMs) so all the management of the underlying infrastructure, hardware, software, power, cabling, manpower, etc, and administration of the servers or VMs are handled by the provider. They also provide security of the cloud i.e., of the infrastructure, however, as an employee, a new hire has to implement security in the cloud for the resources, servers, and services he creates.
* One should turn on Security-Enhanced Linux (SELinux) which is an access control security mechanism provided in the Linux kernel.
* One should secure console access on the Linux server disabling the booting from external devices such as DVDs, CDs, USB pen drives after BIOS setup.
* As an administrator or Linux engineer, one should restrict using old passwords.
* Finding out and checking for any listening or open ports to close or disable them. One could use the "netstat" command to view the open ports.
* One should always disable Root login.
* One can change the default SSH port on a Linux server, thus adding a layer of opacity to keeping the server safe.
* One should disable Ctrl+Alt+Delete in inittab to prevent the server from rebooting process.
* Implementing and using the password-less login feature to SSH into the server without any password, generating only the ssh-keys.
* One should install and run Fail2Ban for SSH login to dynamically alter the firewall rules banning addresses that unsuccessfully attempted to log in a certain number of times.
* One should disable IPv6 wherever it is required and appropriate or when not using it on Linux.
* Pick the right and more or the most secured Linux distribution.
* Setup 2FA/MFA (2 Factor Authentication or Multi-Factor Authentication) for SSH (Secure Shell).
* One should limit who or which accounts an administrator wants them and can use sudo.
* Setup NTP Client for security as the system time correctness accounts to the system's security.
* Secure /proc such that you limit users who can only see information about their processes.
* Implement a password policy for the users forcing their accounts to use secure passwords.
* One should set up automatic security updates and alerts.
* Setup appropriate and secure firewall. Setup firewall with UFW (Uncomplicated Firewall).
* Setting up iptables intrusion detection and prevention with PSAD to monitor all network activities to detect potential intrusion attempts.
* Setting up application intrusion detection and prevention with Fail2Ban tool installed.
* For auditing, set up file/folder integrity monitoring with AIDE (WIP).
* Setting up anti-virus scanning with ClamAV (WIP).
* Setting up rootkit detection with Rkhunter (WIP).
* Or setting up rootkit detection with chrootkit (WIP).
* For monitoring and audit purposes, setting up logwatch which is a system log analyzer and reporter.
* Using the ss tool to see ports (any unwanted ports) the Linux server is listening on.
* Installing and using Lynis tool for Linux security auditing.
* Using encryption tools, features, options, and methods for data communication for Linux server and also for data at rest.
* Disabling or de-activating, or avoiding the usage of FTP, Telnet, and Rlogin or Rsh services on Linux, instead of using OpenSSH, SFTP, or FTPS i.e., FTP over SSL, adding SSL or TLS encryption to FTP.
* Minimizing the installation and usage of many software to minimize vulnerability in Linux.
* One should have only one network service per system, server, or VM Instance.
* Ensuring and keeping Linux server kernel and software always up to date.
* Using Linux security extensions wherever appropriate.
* Setting up password aging for Linux users for better security.
* Setup locking policy to lock user accounts after a certain number of login failures.
* Ensuring and verifying no accounts have empty passwords or ensuring all the accounts have a respective password.
* Ensuring no Non-Root accounts have UID set to 0.
* Also, it requires disabling any and all unwanted Linux services.
* Turning off any and all unwanted services at boot time.
* Deleting X Window Systems (X11) on the server as it is not required.
* One should configure iptables and TCPWrappers firewall on Linux server.
* The Linux kernel configuration file, /etc/sysctl.conf in general, should be hardened.
* One should differentiate and separate disk partitions for Linux systems.
* Ensuring disk quotas is enabled for all users.
* Disabling any and all unwanted SUID and SGID binaries.
* Setup world-writable files on a Linux server such that setting correct user and group permission on them or removing it.
* Assigning noowner files to an appropriate user and group or removing it.
* Using a centralized authentication service on the server.
* Using Kerberos to perform authentication as a trusted third party authentication service using a cryptographic shared secret.
* Implementing appropriate logging and auditing.
* Securing OpenSSH server.
* Disabling USB, firewire, or Thunderbolt devices.
* Securing Apache, PHP, or Nginx server editing httpd.conf configuration files accordingly.
* In general, protecting files, directories, and email against unauthorized data access using file permissions, encryption, password policies, protecting password files, etc.
* Ensure proper backups are set up for scheduled backups and later are restored effectively.

Add a comment
Know the answer?
Add Answer to:
The Linux servers will be composed of web servers, user servers, log servers and database servers(however,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Computer security and system management

    Step-By-Step Assignment Instructions less  Assignment Narrative:  Suppose that you were just hired by a medium size company.  You are replacing a previous system admin that really didn't understand what they were doing.  Your supervisor would like you to suggest ways of building and protecting their Linux server environment based off of your interview (based off of what you learned in this course).    They are proposing the following for a new business venture and would like you to help.  The criteria...

  • As a linux system administrator ,you will have teams/groups of employees of the following: Sales, Software Development, Accounting, and Information Technology. how would you solve this business requir...

    As a linux system administrator ,you will have teams/groups of employees of the following: Sales, Software Development, Accounting, and Information Technology. how would you solve this business requirement , both technically and securely as a new hire ?

  • Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has...

    Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has the following equipment: 5 Servers in San Francisco, LA and Sacramento, all deploying Windows Server 2102R2 as follows: 1 SQL Server Database server in SFO 1 Exchange Email Server in SFO 1 File Server in SFO. This server is also the Domain Controller 1 File Server in Sacramento 1 File Server in L.A The file servers are connected through VPN lines to each other....

  • You have decided to build a web application that allows user authentication(enrolling and verifying users) using...

    You have decided to build a web application that allows user authentication(enrolling and verifying users) using either fingerprint, iris, face recognition or voice. Using the image attached as a guideline, your task is to come up with an architecture plan diagram and a brief explanation of the diagram for this web application, depicting the technologies or technology stack that will be used. Application Delivery Infrastructure Web Server, Portal, Application Server, & User Interface Technology Middleware Infrastructure Enterprise Service Bus, Message...

  • Helpp: Make an application Protocol Application log for text messages In this task, an application protocol for sending...

    Helpp: Make an application Protocol Application log for text messages In this task, an application protocol for sending and retrieving text messages is to be developed. A client (eg app on a smartphone) communicates with an application on a web server running a database of user data (username and password) and messages (user name of the sender, user name of the recipient, message text). The client should be able to perform the following actions: Register a new user Log in...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • You are consulting for a medium size business that has antiquated hardware. The big question is...

    You are consulting for a medium size business that has antiquated hardware. The big question is whether they should invest in all new hardware (three to six servers depending on how many services they want to install on a single server) or to pay for a cloud hosting service to host many of the company’s servers. The CIO is very much in favor of virtualizing the servers in the cloud. She sites cloud computing ability to grow or shrink capacity...

  • JUDY'S HTML TUTORIAL MENU CREATING YOUR FIRST WEB PAGE The best way to make a web...

    JUDY'S HTML TUTORIAL MENU CREATING YOUR FIRST WEB PAGE The best way to make a web page is to just dive right in. Open Notepad. To open notepad in Windows, click the windows icon in the lower left corner of the screen and then type "notepad." Notepad is a text editor. Other text editors you may consider are TextPad, Sublime Text, or NotePad++. Do not use Word or WordPad; they are word processors. If you are using an Apple computer...

  • Hi! it is c++ queue simulation please read the instructions, write codes, and explain the code...

    Hi! it is c++ queue simulation please read the instructions, write codes, and explain the code with comments. Thank you Transactions enter the system and are stored in a queue. Each transaction represents some work that needs to be accomplished. Servers exist which process transactions. Servers take transactions off the queue and process them. you’re building the simulation framework. The idea is that somebody would take your framework, and add the specifics for whatever type of system it was going...

  • C++ -- Event processing simulation using a transaction queue Hi! it is queue simulation please read...

    C++ -- Event processing simulation using a transaction queue Hi! it is queue simulation please read the instructions, write codes, and explain the code with comments. Thank you Transactions enter the system and are stored in a queue. Each transaction represents some work that needs to be accomplished. Servers exist which process transactions. Servers take transactions off the queue and process them. you’re building the simulation framework. The idea is that somebody would take your framework, and add the specifics...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT