|
Quality management review procedure
|
bet | 7/8 | Sana | 21.03.2017 | Hajmi | 75 Kb. | | #597 |
Access Logging -
All servers should have access logging enabled.
-
Logs should be checked regularly (at least weekly) for unusual access attempts.
-
Remote logging (sometimes called sysloging) should be enabled.
-
If it is determined to be necessary, remote access to servers should be highly restricted.
-
The use of encryption for remote access is not optional. SSH and VPN should be used.
-
Remote host access should be limited by single IP or by the smallest IP range possible.
-
Special attention must be given to remotely accessible machines. Host-based intrusion detection should be installed, logging should be increased, accounts on the server should be limited to responsible administrators only and the server should be syslogged.
|
| |