Security Precautions
1. Check computing devices at least weekly for
compliance with respect to all available operating system and application
service packs, patches and hotfixes.
If the computing device requires and initial setup or
installation, this must be done without the computing device having direct
access to the Internet. Many computing devices can be compromised before they
are fully installed and patched if they are connected directly to the Internet
without some form of protection.
2. Whenever
user accounts can be created as a means of granting access to a computing
device, such accounts must be created; with a unique, non-generic account being
given to each user needing access. Verify at least once each semester that all
users (and especially those users with administrative rights) have strong
passwords. Disable default anonymous or generic accounts.
This is often required by law if the system houses
sensitive data.
3. Ensure that
account permissions provide sufficient access to perform job functions and no
more. Check at least once during each semester that users have only the access
permissions they need to do their job.
If the computing device contains sensitive data that
could be used for identity theft, this is required by law
4. Provide physical security:
Computing
devices with sensitive information should be kept behind locked doors or in
locked cabinets with access limited to only those individuals who have a
legitimate need for access.
When there is
no one working at or with a particular computing device, access to the device
should be restricted by either locking the device away, logging out, or "locking" access to the console and
keyboard so that a password or key is
required to regain access.
The room where
a computing device with sensitive data is used should be arranged in a way that
unauthorized individuals cannot see how the device is accessed (combinations,
passwords, etc.), nor is a screen easily viewed by unauthorized users in the
event that sensitive data is being displayed
Written
evidence of user ID's and passwords should not be
left lying around.
5. Implement backup procedures:
Securely
store all original installation media and license keys.
Create and
maintain regular daily backup copies in encrypted format (see #9 below) of at
least the data files on the computing device.
Include some
form of secure storage of backup media at a location owned and maintained by
Idaho State University but physically separate from the location where the
computing device being backed up resides.
Create and
maintain a current emergency repair disk if possible.
Test your
restore procedures at least weekly to verify that backups are valid and
restorable.
6. Use and maintain up-to-date anti-virus
software and daily virus definition updates.
7. Disable any unnecessary services.
Computing devices such as personal computers and
servers often come with many default services enabled (such as e-mail). In many
cases you do not need these services and they should be disabled.
Computing devices that can attach to a network also
make use of communication “ports,” many of which could become the path used by
an attacker to gain unauthorized access to your system. You should block access
to unneeded ports on your computing device. The most common blocking method
used is a local firewall.
8. Enable
security logging on all computing devices that provide logging capabilities.
Scan the security logs on a daily basis looking for anomalies.
In certain cases (such as for systems containing
sensitive information) this may be required by law.
9. Store all
Private Sensitive Information in an encrypted format using at a minimum a key
length of 16 bytes (128 bits).
This is often required in order to comply with various
regulatory mandates.
AES is the recommended algorithm.