CASES.LU

Glossary

  1. ▹ Antivirus
  2. ▹ Assets
  3. ▹ Authentication
  4. ▹ Availability
  5. ▹ Basic criteria for risk analysis
  6. ▹ Computer Hacks
  7. ▹ Confidentiality
  8. ▹ Control
  9. ▹ Cryptography
  10. ▹ Cybercrime
  11. ▹ Cybercriminals
  12. ▹ DRP – Disaster Recovery Plan
  13. ▹ Data backups
  14. ▹ Data loss
  15. ▹ Defacement
  16. ▹ Disinfect machine with a live CD
  17. ▹ Disposal
  18. ▹ Email
  19. ▹ Firewall
  20. ▹ Human error
  21. ▹ IDS/IPS
  22. ▹ Image rights
  23. ▹ Impact
  24. ▹ Integrity
  25. ▹ Internet and copyright
  26. ▹ Legal Aspects
  27. ▹ LuxTrust
  28. ▹ Malicious Codes
  29. ▹ Malicious websites
  30. ▹ Network segmentation
  31. ▹ Password
  32. ▹ Patches
  33. ▹ Phishing
  34. ▹ Physical faults
  35. ▹ Securing a fixed workstation
  36. ▹ Physical theft
  37. ▹ Recommendations for securing a file server
  38. ▹ Recommendations to secure a server connected to Internet
  39. ▹ Recommendations to secure a Web server
  40. ▹ Removable devices
  41. ▹ Risk processing
  42. ▹ Spam – unwanted emails
  43. ▹ SSL/TLS – encryption technologies on the web
  44. ▹ Update softwares with Secunia PSI
  45. ▹ Security Charter
  46. ▹ Social engineering
  47. ▹ Threat
  48. ▹ Virtual Private Networks (VPNs)
  49. ▹ Vulnerabilities
  50. ▹ Web of Trust - WOT
  51. ▹ Web filter – Proxy
  52. ▹ Why is it important to protect your computer?

Recommendations for securing a file server

In brief

A file server is a special server insofar as it is only rarely connected to the Internet, but rather is generally connected to the internal network directly or through a firewall. It is used as a shared storage location for all company files. and because of this it acts as a link between all computers, facilitating internal communication, and also spreading malicious software.

Despite the fact that this server should not be connected to the Internet, in general it is important to follow the same recommendations as for a server connected to the Internet.

Security measures

  1. It is strongly recommended to protect the file server against malicious software (malware). Anti-virus software should be regularly updated in order to recognise and remove the latest malicious code. Draft and enforce a Sectoral policy on Operational and communications aspects – Protection against malware.
  2. It is strongly recommended to use different anti-virus software for the file server than for agent workstations. This makes the chances of detecting a virus that much bigger.
  3. It is strongly recommended to restrict the functionality of the file server to this sole task and not to host any other application on the same virtual or physical server.
  4. It is strongly recommended to place the file server within the network of the entity and not to authorise any access from the exterior to this network. Draft and enforce a Sectoral policy on access control – External connections and Separation of networks.
  5. It is strongly recommended to apply a procedure for the creation and deactivation of user accounts. User accounts are created upon the arrival of each new agent. When an agent leaves, their account access is deactivated so that they can no longer access files. Draft and enforce a Sectoral policy on human factors as well as a sectoral policy on access control.
  6. It is strongly advisable to introduce a formal procedure for the allocation and return of access rights (read, write). Access to data is allocated by the administrator of the data in question. Draft and enforce a Sectoral policy on the Classification and control of resources and a Sectoral policy on access control – Access control policy and Access rights management
  7. It is recommended to implement encryption functionalities if strictly confidential content must be saved on the server. Draft and enforce a Sectoral policy on System development and maintenance – Use of encryption.

Table of Contents

In brief

A file server is a special server insofar as it is only rarely connected to the Internet, but rather is generally connected to the internal network directly or through a firewall. It is used as a shared storage location for all company files. and because of this it acts as a link between all computers, facilitating internal communication, and also spreading malicious software.

Despite the fact that this server should not be connected to the Internet, in general it is important to follow the same recommendations as for a server connected to the Internet.

Security measures

  1. It is strongly recommended to protect the file server against malicious software (malware). Anti-virus software should be regularly updated in order to recognise and remove the latest malicious code. Draft and enforce a Sectoral policy on Operational and communications aspects – Protection against malware.
  2. It is strongly recommended to use different anti-virus software for the file server than for agent workstations. This makes the chances of detecting a virus that much bigger.
  3. It is strongly recommended to restrict the functionality of the file server to this sole task and not to host any other application on the same virtual or physical server.
  4. It is strongly recommended to place the file server within the network of the entity and not to authorise any access from the exterior to this network. Draft and enforce a Sectoral policy on access control – External connections and Separation of networks.
  5. It is strongly recommended to apply a procedure for the creation and deactivation of user accounts. User accounts are created upon the arrival of each new agent. When an agent leaves, their account access is deactivated so that they can no longer access files. Draft and enforce a Sectoral policy on human factors as well as a sectoral policy on access control.
  6. It is strongly advisable to introduce a formal procedure for the allocation and return of access rights (read, write). Access to data is allocated by the administrator of the data in question. Draft and enforce a Sectoral policy on the Classification and control of resources and a Sectoral policy on access control – Access control policy and Access rights management
  7. It is recommended to implement encryption functionalities if strictly confidential content must be saved on the server. Draft and enforce a Sectoral policy on System development and maintenance – Use of encryption.