Cybersecurity: Difference between revisions

From Supporting Role Wiki
Jump to navigationJump to search
(Created page with "CyberSecurity with a Forget About IT® Server")
 
No edit summary
Line 1: Line 1:
CyberSecurity with a Forget About IT® Server
<big>CyberSecurity with a '''Forget About IT®''' Server</big><br />

Forget About IT Ltd use a number of tools to minimise the risks of a breach to your '''Forget About IT®''' server. Based on the 5 technical controls of the UK government's Cyber Essentials, this is what we do:
== Firewalls ==
There are three main types of firewall:
# Boundary Protection<br />
We make sure that the main incoming connection has a firewall and that it is correctly configured, that the default passwords are changed, and that the only incoming traffic is the traffic we want to get through.
# Server firewall<br />
The server we supply is also fire-walled, and the settings are managed so that even if someone managed to turn the firewall off, or change settings, it will revert back to the original settings within the hour.
# Workstation firewall<br />
If we are also looking after your desktop computers, we will also make sure that it's firewall is turned on as well, and is correctly configured.
== Passwords ==
# Default Configuration
We change all the default settings of any network device that could be used as a stepping-off point for an external breach.
# Separate user names and passwords
We set up separate accounts for each user, with passwords that they can manage. If required we can impose a minimum password complexity and age.
# Monitoring<br />
The server has monitoring software that checks for brute force password attacks on externally accessible accounts, and after a certain number of password guesses, the attackers location will be blacklisted.
== Access to Data and Services ==
# Administrative Accounts<br />
If we are looking after your desktop computers, users normally have no administrative rights. If we do not look after your desktops, we usually only allow administrative access to a user's own computer. Since Forget About IT Ltd looks after the server, end users have no administrative access to the server.
# Group membership<br />
Access to data is controller by group membership, and only users authorised to access an area are members of the group used to control access.
# Access to Software<br />
If we are looking after your desktop computers, then we will uninstall all redundant software, and also limit what is installed.
== Viruses and other Malware ==
# Servers<br />
The server regularly scans itself for viruses and alerts us to any concerns. Since the server itself is not allowed to open any files from unknown sources, it's exposure is limited. The server also prevents a known program from accessing areas on the server not explicitly authorised.
# Desktops<br />
If we are looking after your desktop computers, we will make sure there is an an anti-virus / anti-malware solution in place.
== Updating ==
# Servers<br />
The servers install security patches automatically, and we will install all others at the next maintenance interval, which is usually the first "out of hours" period after the patch is released.
# Desktops<br />
If we are looking after your desktop computers, we will regularly check that the devices are up to date. Where possible, we will also make sure automatic updating is enabled.

Revision as of 12:14, 14 May 2018

CyberSecurity with a Forget About IT® Server

Forget About IT Ltd use a number of tools to minimise the risks of a breach to your Forget About IT® server. Based on the 5 technical controls of the UK government's Cyber Essentials, this is what we do:

Firewalls

There are three main types of firewall:

  1. Boundary Protection

We make sure that the main incoming connection has a firewall and that it is correctly configured, that the default passwords are changed, and that the only incoming traffic is the traffic we want to get through.

  1. Server firewall

The server we supply is also fire-walled, and the settings are managed so that even if someone managed to turn the firewall off, or change settings, it will revert back to the original settings within the hour.

  1. Workstation firewall

If we are also looking after your desktop computers, we will also make sure that it's firewall is turned on as well, and is correctly configured.

Passwords

  1. Default Configuration

We change all the default settings of any network device that could be used as a stepping-off point for an external breach.

  1. Separate user names and passwords

We set up separate accounts for each user, with passwords that they can manage. If required we can impose a minimum password complexity and age.

  1. Monitoring

The server has monitoring software that checks for brute force password attacks on externally accessible accounts, and after a certain number of password guesses, the attackers location will be blacklisted.

Access to Data and Services

  1. Administrative Accounts

If we are looking after your desktop computers, users normally have no administrative rights. If we do not look after your desktops, we usually only allow administrative access to a user's own computer. Since Forget About IT Ltd looks after the server, end users have no administrative access to the server.

  1. Group membership

Access to data is controller by group membership, and only users authorised to access an area are members of the group used to control access.

  1. Access to Software

If we are looking after your desktop computers, then we will uninstall all redundant software, and also limit what is installed.

Viruses and other Malware

  1. Servers

The server regularly scans itself for viruses and alerts us to any concerns. Since the server itself is not allowed to open any files from unknown sources, it's exposure is limited. The server also prevents a known program from accessing areas on the server not explicitly authorised.

  1. Desktops

If we are looking after your desktop computers, we will make sure there is an an anti-virus / anti-malware solution in place.

Updating

  1. Servers

The servers install security patches automatically, and we will install all others at the next maintenance interval, which is usually the first "out of hours" period after the patch is released.

  1. Desktops

If we are looking after your desktop computers, we will regularly check that the devices are up to date. Where possible, we will also make sure automatic updating is enabled.