Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Planning a Secure Baseline Installation - Planning a Security Framework

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/31/2011 2:58:28 PM
In recent years, security has become an increasingly important part of the network designer’s and administrator’s jobs. Security is no longer an afterthought; you must include security considerations in all your network planning from the outset, and at every level. Nearly all the remaining lessons in this book are concerned with security issues, but before you deploy the security features in Windows Server 2003, your organization should have a framework for designing and implementing security policies.

High-Level Security Planning

Windows Server 2003 includes a great many security features, tools, and capabilities. Much of this book is devoted to the processes involved in planning, implementing, and maintaining these features. However, before you deploy specific security features, someone must decide which features are appropriate for your organization. A security framework is a logical, structured process by which your organization performs tasks like the following:

  • Estimating security risks

  • Specifying security requirements

  • Selecting security features

  • Implementing security policies

  • Designing security deployments

  • Specifying security management policies

This lesson, therefore, is concerned not so much with developing a security solution for your organization, but with the process your organization uses to develop a security solution.

Creating a Security Design Team

Security is not strictly an IT issue anymore, so the first step in creating a security framework is to determine which people in your organization are going to be responsible for designing, implementing, and maintaining the security policies. Technical people, such as network administrators, might be familiar with the capabilities of specific security mechanisms and how to implement them, but they are not necessarily the best people to identify the resources that are most at risk or the forces that threaten them. Management might be more familiar with the resources that need to be protected and the potential ramifications of their being compromised, but is probably not familiar with the tools that can be used to protect those resources. There are also economic issues to consider, and the effect of new security policies on employee productivity and morale.

All these arguments lead to the conclusion that most organizations need to assemble a team or committee responsible for providing a balanced picture of the organization’s security status and capable of deciding how to implement security policies. The number of people on the team and their positions in the company depend on the organization’s size and political structure. A well-balanced team should consist of people who can answer questions such as the following:

  • What are your organization’s most valuable resources?

  • What are the potential threats to your organization’s resources?

  • Which resources are most at risk?

  • What are the consequences if specific resources are compromised?

  • What security features are available?

  • Which security features are best for protecting specific resources?

  • How secure is secure enough?

  • What is involved in implementing specific security features?

  • How do particular security features affect users, administrators, and managers?

Mapping Out a Security Life Cycle

Creating a security framework is not a one-time project that ends when you have finished designing the initial security plan for your network. Security is an ongoing concern, and the responsibilities of the security design team are ongoing as well. A security life cycle typically consists of three basic phases:

  • Designing a security infrastructure

  • Implementing security features

  • Ongoing security management

These phases are discussed in the following sections.

Designing a Security Infrastructure

The initial design phase of a security infrastructure should run concurrently with the network design. Security issues can have a major effect on many elements of your network design, including the hardware components you purchase, the locations you select for the hardware, and how you configure individual devices. The design phase begins with identifying the resources that need protection and evaluating the threats to those resources.

Even the smallest organization has information it should protect, such as financial data and customer lists. Other valuable commodities might include order entry data, research and development information, and confidential correspondence. In more extreme cases, your organization might possess secret government or military information. The threats to your data can range from the casual to the felonious. In many cases, a modicum of security can protect your confidential data from curious employees and casual Internet predators. However, targeted threats, such as those mounted by business competitors and even rival governments, require more serious security measures.

Tip

In addition to deliberate attempts to penetrate security, your confidential data is in danger from accidents, thefts of equipment, and natural disasters. When planning the protection of your data, don’t forget to include fault tolerance solutions that can prevent data loss due to drive failures, fires, and other accidents.


Once your team has identified the resources that need protection and has determined how severe the threats are, you can plan how to secure them. This is where the technically oriented members of the team come into play, because they are familiar with the security measures that are available and what is involved in deploying them. Depending on the requirements of the organization, the security plan might consist of merely taking advantage of the features already included in the network’s operating systems and other hardware and software components or you might have to purchase additional security products, such as firewalls, smart card readers, or biometric devices.

A typical security plan for a network includes implementations of the following security principles:

  • Access control The granting of specific levels of access based on a user’s identity. Access control capabilities are built into most network operating systems and applications.

  • Auditing A process by which administrators monitor system and network activities over extended periods. Most network operating systems and applications include some form of auditing that administrators can configure to their needs.

  • Authentication The verification of a user’s identity before providing access to secured resources. Authentication mechanisms can use encrypted passwords, certificates, and hardware devices such as smart cards and biometric sensors, depending on the degree of security required.

  • Encryption The process of protecting data through the application of a cryptographic algorithm that uses keys to encrypt and decrypt data. The strength of an encryption mechanism is based on the capabilities of the algorithm itself, the number and types of keys the system uses, and the method of distributing the keys.

  • Firewalls A system designed to prevent unauthorized access to a private network from outside. Firewalls can use a variety of mechanisms to secure a network, including packet filtering, network address translation, application gateways, and proxy servers.

The security plan is not just a matter of technology. Your security team is also responsible for creating security policies for the organization. For example, you might agree to use encrypted passwords for user authentication, but you must also decide who is going to supply the passwords, how long the passwords should be, how often they should change, and so forth.

Implementing Security Features

After deciding what security mechanisms you are going to use and designing your security policies, the next step is to devise an implementation plan for these mechanisms and policies. In some cases, the implementation plan might consist of a procedure and timetable for the process of evaluating, purchasing, installing, and configuring security hardware and software products. For security mechanisms included with operating systems and applications, the implementation plan might consist of modifications to an existing installation or configuration routine.

Implementing security policies can be more problematic than implementing security technologies, because you must devise a way to disseminate the policies to everyone who needs them and to ensure compliance. In some cases, your software will contain mechanisms that enable you to enforce your policies; in other cases, you might have to compel your users to comply using other methods (such as gentle reason and logic or, failing that, bribes and threats).

Enforcing Security Policies

For a simple example, your team might decide that the network users must use passwords at least eight characters long, containing numeric characters and symbols as well as letters, and that users must change their passwords once a month. You can advise the users of these new requirements by sending a general e-mail, but the most important part of the implementation plan would be using a tool like Windows Server 2003 group policies to enforce your requirements. In this case, Windows Server 2003 has preconfigured password policies that enable you to require the use of eight-character, complex passwords, modified every 30 days. In other cases, however, enforcing compliance might be more complicated, for example, asking them not to store their password information in their unlocked desks.


Ongoing Security Management

With your security mechanisms and policies in place, you might be tempted to think that the work of your team is finished, but this is definitely not the case. Security is an ongoing concern that requires the continued attention of the entire team.

For the technical staff, security management means regular checking of audit logs and other resources, as well as monitoring individual systems and network traffic for signs of intrusion. Administrators must also update the security software products as needed. Beyond these regular tasks, however, the entire team must be aware that the organization’s security situation changes constantly. Every day can bring new resources to protect or new threats to existing resources. Security is often an arms race between the intruders and the protectors, and whichever side allows itself to become lax or complacent ends up losing the race.

Other -----------------
- Windows Server 2003 : Planning a Secure Baseline Installation - Selecting Computers and Operating Systems
- BizTalk 2010 Recipes : Messaging and Pipelines - Configuring Port Maps
- BizTalk 2010 Recipes : Messaging and Pipelines - Configuring Send Ports
- BizTalk 2010 Recipes : Messaging and Pipelines - Configuring Receive Ports and Locations
- Windows Server 2008 Server Core : Managing Active Directory with the DSQuery Utility (part 3)
- Windows Server 2008 Server Core : Managing Active Directory with the DSQuery Utility (part 2)
- Windows Server 2008 Server Core : Managing Active Directory with the DSQuery Utility (part 1)
- Using Operations Manager to Monitor Exchange Server 2010 : Outlining OpsMgr Architecture
- Using Operations Manager to Monitor Exchange Server 2010 : Explaining How OpsMgr Works
- Using Operations Manager to Monitor Exchange Server 2010 : OpsMgr Exchange Server 2010 Monitoring
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server