S 4.239 Secure operation of a server

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

The secure operation of a server depends on a number of factors. It is especially important that the administration of the server is performed with great care via secure access.

In the following, several general points that should be observed to securely operate a server are described. More specific information for individual operating systems is given in the corresponding safeguards of the applicable modules.

Administration accesses

There are different ways to access the server for administration purposes. Depending on the type of access used, a number of security precautions must be taken. With larger networks it is recommended to integrate the servers as well in a central network management system, because otherwise secure and efficient administration can hardly be ensured. The methods applied for administration should be specified in the security policy, and administration may only be performed in accordance with the security policy.

In general, it is crucial to gain an overview of which part of the administration of a server should normally be performed

It is advisable to draw up an overview of which administration tasks can be performed in which way for the different types of usage. It is especially important to lay down whether certain tasks must normally not be performed in a certain manner.

Routine administrative activities

It is advisable to draw up notes on the administrators' usual routine activities in accordance with the security policy for the server. This includes activities such as:

Testing configuration changes

Various server programs provide the option of checking configuration changes at least in regard to their technological correctness before they take effect. This helps to avoid a server program not starting after an erroneous configuration change, thus leading to the loss of the service it offers. If such possibilities are available, administrators should be familiar with how to use them and also actually make use of them.

Documentation of work performed on the system

Changes to the system configuration or to the configuration of server programs must be documented. The documentation must be drawn up in such a manner that, if problems occur, the last change can be traced, as well as when it was and by whom it was made. It is important in this context that the documentation can not only be understood by the administrators, but also by an "expert third party", who has nothing to do with the daily operation of the system in question. The documentation should also allow the reproduction of an earlier configuration.

Auditing management systems suggest themselves for changes made to text-based configuration files. In addition, short comments on the effects of the new configurations and on the way they function should be directly added to the configuration files. There are similar tools for other configuration mechanisms, and the software in question often already provides corresponding functionalities by default. If a central administration system is used, the relevant functions should be available and also be used.

Review questions: