If you are looking for a resource to help you through the process of hardening a Unix-based Web server, you can download the U.S. National Security Agency's free UNIX Security Checklist and Unix Security Technical Implementation Guide, which includes a Linux-specific section. The Center for Internet Security (CIS), also provides free Benchmark and Scoring Tools, which are available for all the major operating systems, the Apache Web...
server, and Oracle and SQL Server databases. All of which are continually updated as new vulnerabilities are discovered, so they can be used regularly as part of the lifecycle management process to monitor the effectiveness of your configuration.
Another tool that can be used during the design of any Web server environment, and its subsequent management, is ASSET (Automated Security Self-Evaluation Tool), available from NIST (National Institute of Standards and Technology). ASSET automates the completion of the questionnaire contained in NIST's Security Self-Assessment Guide for Information Technology Systems. The results can be used to evaluate the security of a particular system, and assess the status of your security program plan. ASSET is not subject to copyright protection, is in the public domain and can be downloaded free from http://csrc.nist.gov/asset/asset_download.html.
As with any system, patch management will play a key role in keeping your Web server secure. Products like SecureCentral's PatchQuest can automate the distribution and management of security patches, hotfixes and updates across all networks, including those that use operating systems other than Windows. You may also want to try Shavlik's HFNetChkPro for Linux, which uses the same agentless approach to patch management.
Make sure you develop and maintain a list of specific resources for security issues and software updates that work for your system and establish a procedure for monitoring these information sources.
Dig Deeper on Web Server Threats and Countermeasures
Related Q&A from Michael Cobb
Homomorphic encryption can be used to bypass encryption, but it's for the good of all. Application security expert Michael Cobb explains.continue reading
Expert Michael Cobb explains how password change frequency and reuse for third-party apps should be addressed in enterprise password policies.continue reading
Learn how a Web-based free spam-filtering service can secure email and prevent spam from attacking your enterprise.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.