Computer Security and Control
Computer Security and Control
Please find enclosed several control objectives that should help meet the minimum level
of security and control of a computer network.
A. Desktop
• The user should be required to sign on to their computer with a user id and
password.
• The password for any server other than the personal computer should not be
stored on the personal computer in any file in any format
• Directory and files on the personal computer should be restricted to authorized
users only.
• A legal notice should be displayed to inform the user of the sensitive nature of
the information and their responsibility to keep it safe.
• The last authenticated user should not be displayed on the sign on screen
• A system policy should be in place that prevents the sharing of resources on
the local Windows 95 workstation.
• A user policy should be applied to the Domain Users group, which removes
any common icon groups from the Start Menu.
• A standard security and control configuration should be established and
approved by management. The enforcement of the standard configuration
should be controlled by a network management product through periodic
inventory control.
• Standard applications should be established to reduce the errors and omissions
that occur when supporting multiple end user configurations. In addition, the
establishment of a standard application environment on the desktop should
reduce the support and maintenance effort required.
• For the best overall security the Windows NT 4.0 workstation operating
system should be the recommended standard.
B. File Servers
D. Network Components
E. Firewall
F. Proxy
G. Single Sign On
• The bank should implement, if at all possible, a single sign on solution for end
users
• CiscoSecure may have the capability to meet this objective
H. Host Access
I. Change Control
• The bank should establish an adequate change control policy for the complete
production environment.
• This would include the separation of the following environments:
• Development
• Test (Quality Assurance)
• Production
• Testing standards should be developed to ensure that any change is adequately
tested and that proper test coverage is completed prior to the movement to the
production environment.
J. Incident Reporting
K. Physical Security
L. Contingency Planning
M. Dynamic Alarms
N. Audit Reporting
• Adequate audit reports need to be designed into each device to allow for the
complete and proper review of the current configuration evolution process.
• Audit reporting should be dynamic on sensitive devices and manual on others.
• Tailored reports may be required to meet audit objectives which include but
are not limited to:
• Access control reports
• Who access what, when including Internet access
• Integrity reports that demonstrate that any process or change to a
process what properly tested to ensure that it only performs the activity
required by its function.
• Output control
• Who receives what report(s) that are sensitive? How are spools
controlled to prevent unauthorized users from seeing or changing
sensitive reports?
• Audit trails of any change to the network by delineating the who, why,
when, what was changed on a specific device.
• The Axent product may provide many of the audit and security reports for the
NT, Novell, and Unix environments.
• Key Audit and Security Reports
• Daily Attack Report - a daily report of any suspicious internal or external
attack.
• Daily violation report - This report should be compilation of all violation
attempts to any network device. This report should be available for
review if requested by Auditing. The daily review of this report would be
the responsibility of the Security Administrator or System/Network
Administrator.
• Daily change log - This report should be a compilation of all changes to
the devices within the network
• Daily incident report - This report would indicate any operational
problems that occur with the network. This would include all of the
network devices and their operational status. A timely resolution report
with appropriate solution sets should follow or be included as part of the
report.
O. Security Certification
• A secured configuration based should be established for each device and the
system should automatically identify any new device.
• Any new device would be immediately interrogated to ensure that it meets the
minimum security and control requirements of the Bank
P. Port Filtering
• Ensure that there is limited administration access to maintain the IIS servers
• Ensure that any special services running on the server are required
• Ensure that proper authentication standards are being met for system
administration to the server
• Ensure that all maintenance activity is properly recorded
• Ensure that any configuration changes are properly tested and approved
• Ensure that the proper sheets for configuration are established
• Property Sheets
• Service - the following services should be set
• Connection Timeout
• Maximum Connections
• Anonymous Logon
• Username
• Password
• Password Authentication
• Allow Anonymous
• Windows NT Challenge/Response
• Directories
• Directories allowed
• Enable Default Document
• Directory Browsing Allowed
• When adding a new directory you can Edit Properties which allows
you to set:
• Alias
• Account Information - User Name & Password
• Virtual Server
• Access Rights
• Read Execute Secured Socket Layer (SSL)
• Logging
• Enable Logging
• Log To File
• Automatically Log to SQL/ODBC DBMS
• Log file directory
• Log file name
• Advanced
• Access IP Address Subnet Mask
• Limit Network Use by all Internet Services on this computer
• Backup files should be secured if sensitive data such as encrypted passwords
are on the files.
Q. MicroSoft's Exchange
• Exchange Security
• Advanced Security
• Signing
• Sealing (Encryption)
• Security Options
• Permissions
• Mailbox Permission
• More than one or user account can have permission on a
• mailbox
• Public Folder Permission
• Permission to access public folder can be granted by the owner of a
public folder.
• Directory Permissions
• Permissions to use the directory are granted to Windows NT user
accounts.
• Auditing
• All audited events are recorded in NT's Event Log.
R. Gateways
• Ensure that there is limited administration access to maintain these servers
• Ensure that any special services running on the server are required
• Ensure that proper authentication standards are being met for system
administration to the server
• Ensure that all maintenance activity is properly recorded
• Ensure that any configuration changes are properly tested and approved
• Ensure that any connection logging does not record the user id and password
of the connection in clear text. If it does ensure that these passwords are
encrypted or removed from the log file.
• Backup files should be secured if sensitive data such as encrypted passwords
are on the files.
S. Directory Servers
T. SQL/Server
U. H.P. OpenView
V. Optivity
AA. Other products that may aid in the security and control of the network
• Our preliminary review of the network design by Kevin Mr. Kasperek takes
into consideration many of the security and control issues facing the industry
today. His overall design is quite sound and insightful on the issues of
security and control. His solution for VPNs and Internet traffic appears to
meet many of the control concerns that are present with the use of Internet
access.
• Internet Scanner Toolset - is an excellent set of programs that will identify
vulnerabilities within the Bank's networked environment. These tools should
be run on periodic bases including each time a major change is concluded
within the environment.