Loyola University Chicago

- Navigation -

Loyola University Chicago

Information Technology Services

Server Security Standard

Scope:

This standard applies to servers procured through, operated or contracted by Loyola University Chicago that house or interact with Loyola Protected data per the Data Classification Policy.

 

Purpose: 

The purpose of this document is to establish standards for the base configuration of servers. Effective implementation of this standard will minimize security incidents involving University resources.

 

Standard:

Ownership and Responsibilities

All servers deployed at the University must be owned by an operational group that is responsible for system administration. Approved server configuration guides must be established and maintained by each operational group, based on business needs and approved by the Information Security Officer.  Each operational group must establish a process for changing the configuration guides, which includes review and approval by the Information Security Team.

  • Servers must be inventoried by each operational group. At a minimum, the following information is required to positively identify the point of contact:
    • Server contact(s) and location, and a backup contact
    • Operating System, Version and Service Pack level
    • Main functions and applications, if applicable
  • Server inventories must be kept up-to-date on a semi-annual basis.
  • Server must be affixed with a Loyola Asset Tag inventory barcode.
  • Configuration changes for production servers must follow the Change Management System Procedures.

Server Location

Servers that store, process or transmit Loyola Protected data are classified as high security servers.  Additionally, administrators may request that a server which does not store, process, or transmit Loyola Protected data be classified as a high security server. All high security servers must physically reside within secured ITS data centers.

If the high security server stores Protected data it must be segmented into the High Security (Internal) network security zone, per the ITS Network Firewall Policy.

If the high security server interacts with other high security servers, and is required to publish content outside of the High Security network security zones, per the ITS Network Firewall Policy, then it must be segmented into the High Security DMZ network security zone.

General Configuration Guidelines

  • Operating System configuration should be in accordance with approved Information Security guidelines, as referenced in the Appendix.
  • A server housed in a High Security network security zone may not have more than one primary function.  Core services (DHCP, DNS, NTP) may be housed on the same server in a High Security network security zone.  If you are unsure of the number of functions on your server, contact the Information Security Team.
  • Disable all unnecessary and insecure services and applications.
  • System access and security logging shall abide by the ITS Log Management Standard.
  • The most recent OS and application security patches must be installed on the server within thirty days of its release.
  • Trust relationships between systems are a security risk, and their use should be avoided. Do not use a trust relationship when some other method of communication will do.  Contact the Information Security Team if you are unaware of alternatives to using trust relationships.
  • All administrative access will be accomplished per the ITS Access Control Policy and Privileged Access Policy
  • If a methodology for secure channel connection is available (i.e., technically feasible), privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec).

Backup

  • All security-related events on high security servers must be logged and audit trails saved as follows:
  • o   All security related logs will be kept online for a minimum of 1 week.
  • o   Daily incremental tape backups will be retained for at least 1 month.
  • o   Weekly full tape backups of logs will be retained for at least 1 month.
  • o   Monthly full backups will be retained for a minimum of 2 years.
  • All high security backups will be backed up to a separate tape pool.  The list of items will be complied with:
    • A unique set of labels that can be used to identify the tape media as containing Loyola Protected data.
    • An inventory of this media will be maintained by the backup administrators.
    • If media moves outside of the secured data center it must first be approved by the Service Operations and Data Center Manager.
    • If media moves outside of the secured data center it must be moved through secured courier, or another method that can be accurately tracked.
    • Any backup tapes that become decommissioned will be degaussed.

Monitoring

  • Security-related events will be reported to the Information Security Team, Corrective measures and information disclosure will be prescribed as needed, as per the ITS Incident Response Handbook. Security-related events include, but are not limited to:
  • o   Port-scan attacks
  • o   Evidence of unauthorized access to privileged accounts
  • o   Anomalous occurrences that are not related to specific applications on the host.

Compliance

  • Audits will be performed on a yearly basis at a minimum by authorized Information Security Team members within the University.
  • Audits will be managed by the Information Security Team. The Information Security Team will filter findings not related to a specific operational group and then present the findings to the appropriate support staff for remediation or justification.
  • In accordance with the ITS Vulnerability Assessment Policy, every effort will be made to prevent audits from causing operational failures or disruptions.

 

Exceptions:

Exceptions to this policy will be handled in accordance with the ITS Security Policy.

Review:

This policy will be maintained in accordance with the ITS Security Policy.

Emergencies:

In emergency cases, actions may be taken by the Incident Response Team in accordance with the procedures in the ITS Incident Response Handbook.  These actions may include rendering systems inaccessible.


Appendix

Documents Referenced

Data Classification Policy

Change Management System Procedures

ITS Access Control Policy

ITS Incident Response Handbook

ITS Log Management Standard

Privileged Access Policy

ITS Vulnerability Assessment Policy

ITS Security Policy

 

References

RFC 1918 (http://www.faqs.org/rfcs/rfc1918.html)

(http://benchmarks.cisecurity.org/)

  CIS_Win2003_MS_Benchmark_v2.0.pdf

  CIS_Win2K_Srv_Benchmark_v2.2.1.pdf

  CIS_AIX_Benchmark_v1.0.1.pdf

  CIS_SQL2005_Benchmark_v2.0.pdf

  CIS_VM_Benchmark_v1.0.pdf

  CIS_VMware_ESX_Server_Benchmark_v1.1.pdf

  CIS_SUSE_Linux_Benchmark_V2.0.pdf

  CIS_RHEL5_Benchmark_v1.0.5.pdf

  CIS_RHLinux_Benchmark_v1.0.5.pdf

  CIS_FreeRADIUS_Benchmark_v1.0.pdf

  CIS_BIND_Benchmark_v1.0.pdf

  CIS_eDirectory8.7_Benchmark_v2.0.pdf

  CIS_OESNetWare_Benchmark_v1.0.pdf

 

HISTORY

 August 4, 2011: Initial Policy

 October 30, 2012: Annual Review for PCI Compliance

July 12, 2013: Annual Review for PCI Compliance, Corrected Links

 Author: UISO

Version: 1.2

 

PDF FILE DOWNLOAD

 

Loyola

Information Technology Services
1032 W. Sheridan Ave. · Chicago, IL 60660 · 773.508-4ITS

InfoServices@luc.edu

Notice of Non-discriminatory Policy