Educause Security Discussion mailing list archives

Re: Secure Server Procedure


From: Chad McDonald <chad.mcdonald () GCSU EDU>
Date: Tue, 27 Feb 2007 08:20:53 -0500

There is a good Unix checklist at http://www.cert.org/tech_tips/
usc20_essentials.html

Chad McDonald, CISSP, CISA
Chief Information Security Officer
Georgia College & State University
Phone   478.445.4473
Cell    478.454.8250
Fax     478.445.1202
Email   chad.mcdonald () gcsu edu

We are defining some new servers that we wish to classify as Secure
Servers.  We have a policy in place for server hardening, however we do
not have a step based procedure or checklist. Is anyone willing to share
their procedure for developing a Secure Server?

Thank you,
Charlie Kutil

Charlie Kutil, M.P.H., CISSP
Information Policy & Security Officer
Office of Information Technology (OIT)
Texas A&M Health Science Center
Coastal Bend Health Education Center
(O) 361-825-2805
(C) 361-876-3781

Current thread: