Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

     DB Server: -list of custom installations-

Security requirements:

     Physical server security: assumes data center is secured

     Local security: Set up appropriate new users, restricting root access

     File system security: Umask settings, setting up appropriate file permissions

     OS kernel security: assumes provider to have latest kernel updates/patches

     Password & Access security: use of public/private keys, SSH tunnels.

     Network security: Firewall, TCP wrapper, disabling unused ports & services