The Ultimate Network Security Checklist
The Ultimate Network Security Checklist
The Ultimate Network Security Checklist
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Follow GFI:
HOME
ABOUT US
TRIALS
BLOGROLL
VIDEO
TOP POSTS
CONTACT
Working on your network security? Check. Want to make sure you have all your bases covered? Check. Need some help getting started? Check. How about a simple list you can follow, broken down by category, which includes some tips and tricks for getting the job done? Here it is The Ultimate Network Security Checklist: a document that provides you with the areas of information security you should focus on, along with specific settings or recommended practices that will help you to secure your environment against threats from within and without. Using this checklist as a starting point and working with the rest of your IT team, your management, human resources, and your legal counsel, you will be able to create the ultimate network security checklist for your specific environment. Thats an important distinction; business requirements, regulatory and contractual obligations, local laws, and other factors will all have an influence on your companys specific network security checklist, so dont think all your work is done. Youll need to tweak this to suit your own environment, but rest assured the heavy lifting is done! Well break this list down into broad categories for your ease of reference. Some of the breakdowns may seem arbitrary, but you have to draw lines and break paragraphs at some point, and this is where we drew ours.
1. Policies
The best laid plans of mice and men oft go awry, and nowhere can this happen more quickly than where you try to implement network security without a plan, in the form of policies. Policies need to be created, socialized, approved by management, and made official to hold any weight in the environment, and should be used as the ultimate reference when making security decisions. As an example, we all know that sharing passwords is bad, but until we can point to the company policy that says it is bad, we cannot hold our users to account should they share a password with another. Heres a short list of the policies every company with more than two employees should have to help secure their network: 1. Acceptable Use Policy 2. Internet Access Policy 3. Email and Communications Policy 4. Network Security Policy
1 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Recent Posts
GFI Labs Email Roundup for the Week Rolex Spam Rolls Out in Time for Black Friday test post VIPRE Business Premium Launches with a Unique Feature
Tech Zone
13 IT Projects to Include in Your Plans for 2013 New Phishing Campaign Targets LinkedIn Users with Fake Reminders Spyware: The Next Generation Unsolicited Phone Call Scams - Part Two
Recent Comments
Scammers Target Chikka Users Introducing VIPRE Internet Security 2013 Introducing VIPRE Internet Security 2013 Introducing VIPRE Internet Security 2013
TalkTechToMe - Copyright 2012 GFI Software | Privacy Policy | Copyright | Blog Terms of Use | Contact
GFI Fixes It
GFI MailArchiver 2011: A Key Tool in Your VAR Toolbox
More articles
2 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Chistian Oliver February 24, 20123:39 pm Wow this list is mind blowing!!!!!
Xerxes Cumming February 25, 20129:11 am For me, making sure workstations are in good shape (secured, updated and physically in excellent condition) should be the top-most concern rather than the server itself. I also would like to add that vulnerability scan and patch management should go hand in hand. You should not do or apply only one. Ive been a white hacker for several years now and these two network security methodologies are a must for both the server and the workstations. Organizations and enterprises with more than 50 employees and a hundred computer units should have these two in place. Adam Loveland February 25, 20121:31 pm Quite an exhaustive list, but thats the kind of thorough attention to detail that is necessary when reviewing network security. One hole in any one of these spots can effectively bring most of the others down. You may not need this much consideration for a smaller business, but if you have an intention to grow it is ALWAYS a better idea to have the infrastructure in place first and grow to fit it. Roger Willson February 27, 20129:15 am A great list! It is really a concise representation of all the points that need to be secured. I think this list can be used as a basis for security for companies of all sizes. For a small company it can be used verbatim, while for a large one there might need to be some additions but all in all, awesome work, thank you! Thomas Macadams February 28, 20122:51 am Backup backup backup. If theres one GREAT thing I learned way back in college that is to backup all network programs and systems. When all backups are in place, network security and protection will be a breeze. And with Cloud Computing on the steady rise, automatic backups of your workstations and server will be both practical and easier to do. If you are a competent network administrator or an IT manager, backup / restore should be one of the top in your checklist. Remco February 28, 20128:39 pm A great list indeed! What i really would like to see is a tool or an excel sheet as an example of documenting these information, because i keep strugling wich data is important and how to save them efficient. Any suggestions?
Christina Goggi March 5, 201211:13 am Thanks Remco! Everyone has their own method; the most common approach is probably keeping a cheat sheet (which is just a concise list of the items you think apply to you). Then update it gradually things that become second nature can be removed and new things you encounter should get added.
Kevin Fraseir February 29, 20126:33 am STAY AWAY FROM TORRENT-BASED WEBSITES. As an experienced senior network administrator for more than eight years, Ive encountered some of the toughest network security risks there is. Name it and I know them down to their source codes. From these threats, the toughest for me are torrent-based infections and attacks. Its a bad idea to download files (mp3s, videos, games, etc) from websites that host torrents. Some downloaded torrent have extra and unnecessary files attached to them. These files can be used to infect your computers and spread viruses. Be extra careful about downloading pirated DVD screener movies especially if it contains subtitles (usually it has a .srt file extension). Subtitle files are sometimes encoded with malicious codes.
3 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Gill Langston March 13, 201211:06 pm Torrents are bad news for so many reasons.. besides the fact that a user in a corporate environment can infect the entire network just because they wanted to download a song or movie, they could leave the company legally liable for copyright infringement. Especially when the torrent client is sharing files to others. That means the company network is now hosting pirated content. Stephen July 20, 201212:27 pm Kevin, I understood that a .srt file is just text. Please could you explain how this can be a threat? Thanks.
Crunchy July 26, 20123:14 pm Its a text file, it could contain code that executes when it is open. If youre familiar with coding you could just edit the .srt file to see if there is anything crazy on it
5. Remote Access Policy 6. BYOD Policy 7. Encryption Policy 8. Privacy Policy A great resource for policy starter files and templates is the SANS Institute at http://www.sans.org.
2. Provisioning Servers
When asked why he robbed banks, American criminal Willie Sutton answered because thats where the money is. If you could ask a hacker why s/he breaks into servers would probably reply with a similar answer because thats where the data is. In todays society, data is a fungible commodity that is easy to sell or trade, and your servers are where most of your companys most valuable data resides. Here are some tips for securing those servers against all enemies both foreign and domestic. Create a server deployment checklist, and make sure all of the following are on the list, and that each server you deploy complies 100% before it goes into production.
Server list
Maintain a server list that details all the servers on your network SharePoint is a great place for this. At a minimum it should include all the name, purpose, ip.addr, date of service, service tag (if physical), rack location or default host, operating system, and responsible person. Well talk about some other things that can be stored on this server list down below, but dont try to put too much data onto this list; its most effective if it can be used without side to side scrolling. Any additional documentation can be linked to or attached. We want this server list to be a quick reference that is easy to update and maintain, so that you do.
Responsible party
Each server must have a responsible party; the person or team who knows what the server is for, and is responsible for ensuring it is kept up-to-date, and can investigate any anomalies associated with that server.
Naming convention
Naming conventions may seem like a strange thing to tie to security, but being able to
4 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
quickly identify a server is critical when you spot some strange traffic, and if an incident is in progress, every second saved counts.
Network Configuration
Ensure that all network configurations are done properly, including static ip.addr assignments, DNS servers, WINS servers, whether or not to register a particular interface, binding order, and disabling services on DMZ, OOB management, or backup networks.
IPAM
All servers should be assigned static IP addresses, and that data needs to be maintained in your IP Address Management tool (even if thats just an Excel spreadsheet). When strange traffic is detected, its vital to have an up-to-date and authoritative reference for each ip.addr on your network.
Patching
Every server deployed needs to be fully patched as soon as the operating system is installed, and added to your patch management application immediately.
Antivirus
All servers need to run antivirus software and report to the central management console. Scanned exceptions need to be documented in the server list so that if an outbreak is suspected, those directories can be manually checked.
Remote access
Pick one remote access solution, and stick with it. I recommend the built-in terminal services for Windows clients, and SSH for everything else, but you may prefer to remote your Windows boxes with PCAnywhere, RAdmin, or any one of the other remote access applications for management. Whichever one you choose, choose one and make it the standard.
Domain joined
Unless theres a really good reason not to, such as application issues or because its in the DMZ, all Windows servers should be domain joined, and all non-Windows servers should use LDAP to authenticate users against Active Directory. You get centralized management and a single user account store for all your users.
5 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
No matter what you use to administer and monitor your servers, make sure they all report in (or can be polled by) before putting a server into production. Never let this be one of the things you forget to get back to.
SNMP configured
If you are going to use SNMP, make sure you configure your community strings, and restrict management access to your known systems.
Agents installed
Backup agents, logging agents, management agents; whatever software you use to manage your network, make sure all appropriate agents are installed before the server is considered complete.
Backups
If its worth building, its worth backing up; no production data should ever get onto a server until it is being backed up.
Restores
And no backup should be trusted until you confirm it can be restored.
Vulnerability scan
If you really think the server is ready to go, and everything else on the list has been checked off, theres one more thing to do scan it. Run a full vulnerability scan against each server before it goes production to make sure nothing has been missed, and then ensure it is added to your regularly scheduled scans.
3. Deploying workstations
Making sure that the workstations are secure is just as important as with your servers. In some cases its even more so, since your servers benefit from the physical security of your datacenter, while workstations are frequently laptops sitting on table tops in coffee shops while your users grab another latte. Dont overlook the importance of making sure your workstations are as secure as possible.
Workstation list
Keep a list of all workstations, just like the server list, that includes who the workstation was issued to and when its lease is up or its reached the end of its depreciation schedule. Dont forget those service tags!
Assigned user
Track where your workstations are by making sure that each users issued hardware is kept up-to-date.
Naming convention
Its very helpful when looking at logs if a workstation is named for the user who has it. That makes it much easier to track down when something looks strange in the logs.
Network Configuration
6 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Youll probably assign IP addresses using DHCP, but you will want to make sure your scopes are correct, and use a GPO to assign any internal DNS zones that should be searched when resolving flat names.
Patching
Since your users are logged on and running programs on your workstations, and accessing the Internet, they are at much higher risk than servers, so patching is even more important. Make sure all workstations are fully up-to-date before they are deployed, update your master image frequently, and ensure that all workstations are being updated by your patch management system.
Antivirus
Heres how to handle workstation antivirus: 100% coverage of all workstations; workstations check a central server for updates at least every six hours, and can download them from the vendor when they cannot reach your central server. All workstations report status to the central server, and you can push updates when needed Easy.
Remote access
Like servers, pick one remote access method and stick to it, banning all others. The more ways to get into a workstation, the more ways an attacker can attempt to exploit the machine. The built-in Remote Desktop service that comes with Windows is my preference, but if you prefer another, disable RDP. Ensure that only authorized users can access the workstation remotely, and that they must use their unique credential, instead of some common admin/password combination.
Power saving
Consider deploying power saving settings through GPO to help extend the life of your hardware, and save on the utility bill. Make sure that you have Wake-On-LAN compatible network cards so you can deploy patches after hours if necessary.
Domain joined
All workstations should be domain joined so you can centrally administer them with unique credentials.
Backups/ Restores
You probably wont perform regular full backups of your workstations, but consider folder redirection or Internet based backups to protect critical user data.
7 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Local encryption
There is no excuse for letting any laptop or portable drive out of the physical confines of the office without encryption in place to protect confidential data. Whether you use Bitlocker, TrueCrypt, or hardware encryption, make is mandatory that all drives are encrypted.
Vulnerability scan
Perform regular vulnerability scans of a random sample of your workstations to help ensure your workstations are up to date.
4. Network equipment
Your network infrastructure is easy to overlook, but also critical to secure and maintain. Well start with some recommendations for all network equipment, and then look at some platform specific recommendations.
Network Configuration
Have a standard configuration for each type of device to help maintain consistency and ease management.
IPAM
Assign static IP addresses to all management interfaces, add A records to DNS, and track everything in an IP Address Management (IPAM) solution.
Patching
Network hardware runs an operating system too, we just call it firmware. Keep up-to-date on patches and security updates for your hardware.
Remote access
Use the most secure remote access method your platform offers. For most, that should be SSH version 2. Disable telnet and SSH 1, and make sure you set strong passwords on both the remote and local (serial or console) connections.
Unique credentials
Use TACACS+ or other remote management solution so that authorized users authenticate with unique credentials.
SNMP configured
If you are going to use SNMP, change the default community strings and set authorized management stations. If you arent, turn it off.
Backups/Restores
Make sure you take regular backups of your configurations whenever you make a change, and that you confirm you can restore them.
Vulnerability scan
Include all your network gear in your regular vulnerability scans to catch any holes that crop up over time.
Switches
VLANs
8 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Use VLANs to segregate traffic types, like workstations, servers, out of band management, backups, etc. Promiscuous devices and hubs Set port restrictions so that users cannot run promiscuous mode devices or connect hubs or unmanaged switches without prior authorization. Disabled ports Ports that are not assigned to specific devices should be disabled, or set to a default guest network that cannot access the internal network. This prevents outside devices being able to jack in to your internal network from empty offices or unused cubicles.
Firewalls
Explicit permits, implicit denies Deny All should be the default posture on all access lists inbound and outbound. Logging and alerts Log all violations and investigate alerts promptly.
Routers
Routing protocols Use only secure routing protocols that use authentication, and only accept updates from known peers on your borders.
5. Vulnerability scanning
Weekly external scans scheduled
Configure your vulnerability scanning application to scan all of your external address space weekly.
6. Backups
Tape rotation established
Make sure you have a tape rotation established that tracks the location, purpose, and age of all tapes. Never repurpose tapes that were used to backup highly sensitive data for less secure purposes.
9 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Encryption
Even reputable courier services have lost tapes; ensure that any tape transported offsite, whether through a service or by an employee, is encrypted to protect data against accidental loss.
7. Remote Access
Only approved users and methods
Set up and maintain an approved method for remote access, and grant permissions to any user who should be able to connect remotely, and then ensure your company policy prohibits other methods.
No split tunneling
Protect your travelling users who may be on insecure wireless networks by tunneling all their traffic through the VPN instead of enabling split tunneling.
Account lockouts
Set strong account lockout policies and investigate any accounts that are locked out to ensure attackers cannot use your remote access method as a way to break into your network.
8. Wireless
In addition to the items in the network equipment list above, you want to ensure the following for your wireless networking.
SSID
Use an SSID that cannot be easily associated with your company, and suppress the broadcast of that SSID. Both arent particularly effective against someone who is seriously interested in your wireless network, but it does keep you off the radar of the casual war driver.
Authentication
Use 802.1x for authentication to your wireless network so only approved devices can
10 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
connect.
Encryption
Use the strongest encryption type you can, preferable WPA2 Enterprise. Never use WEP. If you have barcode readers or other legacy devices that can only use WEP, set up a dedicated SSID for only those devices, and use a firewall so they can only connect to the central software over the required port, and nothing else on your internal network.
Guest Network
Use your wireless network to establish a guest network for visiting customers, vendors, etc. Do not permit connectivity from the guest network to the internal network, but allow for authorized users to use the guest network to connect to the Internet, and from there to VPN back into the internal network, if necessary.
BYOD
Create a Bring Your Own Device policy now, even if that policy is just to prohibit users from bringing their personal laptops, tablets, etc. into the office or connecting over the VPN.
9. Email
Inbound and outbound filtering
Deploy an email filtering solution that can filter both inbound and outbound messages to protect your users and your customers.
Antivirus/Antispam/Antiphishing
Deploy mail filtering software that protects users from the full range of email threats, including malware, phishing and spam.
Filter lists
Use filter lists that support your companys acceptable use policy.
Malware scanning
Scan all content for malware, whether that is file downloads, streaming media, or simply scripts contained in web pages.
Bandwidth restrictions
Protect your business-critical applications by deploying bandwidth restrictions, so users access to the Internet doesnt adversely impact company functions like email, or the corporate website.
Port blocking
Block outbound traffic that could be used to go around the Internet monitoring solution so users are tempted to violate policy.
11 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Least privilege
Always assign permissions using the concept of least privilege. Need access should translate to read only and full control should only ever be granted to admins.
Groups
Never assign permissions to individual users; only use domain groups. Its more scalable, easier to audit, and can carry over to new users or expanding departments much more easily than individual user permissions.
13. Time
Use a central form of time management within your organization for all systems including workstations, servers, and network gear. NTP can keep all systems in sync, and will make correlating logs much easier since the timestamps will all agree. Use this checklist to help jumpstart your own information security practices, and youll be well on your way to maintaining a safe and secure network. Know of any other tips that should be included in the security checklist? Leave a comment and let us know.
Like our surveys and infographics? Subscribe to our RSS feed or email feed (on the right hand side) now, and be the first to get them!
Share
38
12 of 13
11/20/2012 5:38 PM
http://www.gfi.com/blog/the-ultimate-network-security-checklist/
Your email:
13 of 13
11/20/2012 5:38 PM