Quality management review procedure




Download 75 Kb.
bet7/8
Sana21.03.2017
Hajmi75 Kb.
#597
1   2   3   4   5   6   7   8

Access Logging


  • All servers should have access logging enabled.

  • Logs should be checked regularly (at least weekly) for unusual access attempts.

  • Remote logging (sometimes called sysloging) should be enabled.

Remote Access to Servers


  • If it is determined to be necessary, remote access to servers should be highly restricted.

  • The use of encryption for remote access is not optional. SSH and VPN should be used.

  • Remote host access should be limited by single IP or by the smallest IP range possible.

  • Special attention must be given to remotely accessible machines. Host-based intrusion detection should be installed, logging should be increased, accounts on the server should be limited to responsible administrators only and the server should be syslogged.


Download 75 Kb.
1   2   3   4   5   6   7   8




Download 75 Kb.