Sitemap

Checklist for Securing and Hardening your Server Environment

This general security checklist can serve as a starting point for organizations to improve the security of their servers and environment. As the technology behind cyber security is always evolving, it is important to regularly maintain and upgrade their security systems.

Have Questions?  Contact Us!

Manage Server Access

  • Don't forget physical server security
    • only allow trusted personnel
    • keep staff informed/trained
  • Manage access to your servers
    • restrict critical apps and system files to admins


Minimize the External Footprint


Patch Vulnerabilities

  • Keep Browsers & Plugins updated
  • Update the OS & other applications

 

Minimize Attack Surface

  • Minimize unnecessary software on your servers
  • Install on a Windows Server Core
  • Remove unnecessary operating system components
  • Unnecessary services should be disabled
  • Component/Feature Management - Add what you need, remove what you don't

 

Restrict Admin Access

  • Limit membership to admin users/groups
  • Create multiple admin accounts with lesser access
  • Limit dedicated servers to admin responsibilities

 

Know What's Happening

  • Audit access permissions & access changes
  • Maintain server logging
    • Mirror logs to a separate log server
  • Scans/Audits of the server - check for malware/hacks

 

Minimize User Access Permissions

  • Limit user account access
  • Group user access / permissions by role
  • Restrict sensitive information to trusted accounts only
  • Manage security considerations of user directory accounts
  • Elevated access should only be on an as-needed basis
  • Delete unnecessary OS users

 

Establish Communications


Further Hardening / Protecting Credentials

  • Use Security applications, such as anti-virus/anti-malware
    • Choose reputable, well-known, well-tested
  • Keep Security applications updated
  • Use very strong passwords, especially for Administrative passwords
  • Change passwords infrequently, do not reuse them
  • Change regular account names from 'admin' or 'guest'
  • Lock accounts after too many login failures. These could be illegitimate attempts to gain access.
    • Note: be careful with setting LDAP/AD directories lockout policies, as some configurations could become lockout-prone/problematic.
  • Use auto-lock OS features


Backup Plans

  • Maintain proper backups
  • Use non-elevated account privileges where possible


Prevent Time Drift

  • Keep server clock in-sync

 
Harden Remote Sessions

  • Secure and monitor SSH
    • Change the port from default
    • Disable elevated privileges where possible
    • Use non-elevated account privileges where possible

 

Use Recommended Security Configurations

  • Review recommended Security Settings from trusted sources, e.g.:
  • Establish a security baseline for your organization

 

References: