{"id":859,"date":"2008-05-09T00:00:00","date_gmt":"2008-05-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/09\/draft-guidance-for-securing-servers\/"},"modified":"2021-12-30T11:38:17","modified_gmt":"2021-12-30T11:38:17","slug":"draft-guidance-for-securing-servers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/09\/draft-guidance-for-securing-servers\/","title":{"rendered":"Draft guidance for securing servers"},"content":{"rendered":"<p>The National Institute of Standards and Technology is seeking comment on its draft guidelines for securing servers, released this week.  NIST Special Publication 800-123 [1], &#8220;Guide to General Server Security,&#8221; makes recommendations for securing server operating systems and softwarein addition to maintaining a secure configuration with patches and software upgrades, security testing, log monitoring and backups of data and operating system files.  The recommendations apply to a variety of typical servers, such as Web, e-mail, database, infrastructure management and file servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Common security threats addressed include exploitation of software bugs to gain unauthorized access, denial-of-service attacks, exposure or corruption of sensitive data, unsecured transmission of data, use of a server breach to gain access to other network resources and use of a compromised server to launch attacks.<\/p>\n<p>NIST recommended that security plans be considered from the initial planning stage because addressing security is more difficult after deployment.<\/p>\n<p>&#8220;Organizations are more likely to make decisions about configuring computers appropriately and consistently when they develop and use a detailed, well-designed deployment plan,&#8221; the document said.  * Standardized software configurations that satisfy the information system security policy&#8230;.  Because manufacturers are not aware of each organization&#8217;s security needs, each server administrator must configure new servers to reflect their organization&#8217;s security requirements and reconfigure them as those requirements change,&#8221; NIST advised.<\/p>\n<p>&#8220;The overarching principle is to install the minimal amount of services required and eliminate any known vulnerabilities through patches or upgrades,&#8221; the document said.<\/p>\n<p>http:\/\/www.gcn.com\/online\/vol1_no1\/46239-1.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-859","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/859\/revisions"}],"predecessor-version":[{"id":3346,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/859\/revisions\/3346"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}