If you are looking for a resource to help you through the process of hardening a Unix-based Web server, you can...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
download the U.S. National Security Agency's free UNIX Security Checklist and Unix Security Technical Implementation Guide, which includes a Linux-specific section. The Center for Internet Security (CIS), also provides free Benchmark and Scoring Tools, which are available for all the major operating systems, the Apache Web server, and Oracle and SQL Server databases. All of which are continually updated as new vulnerabilities are discovered, so they can be used regularly as part of the lifecycle management process to monitor the effectiveness of your configuration.
Another tool that can be used during the design of any Web server environment, and its subsequent management, is ASSET (Automated Security Self-Evaluation Tool), available from NIST (National Institute of Standards and Technology). ASSET automates the completion of the questionnaire contained in NIST's Security Self-Assessment Guide for Information Technology Systems. The results can be used to evaluate the security of a particular system, and assess the status of your security program plan. ASSET is not subject to copyright protection, is in the public domain and can be downloaded free from http://csrc.nist.gov/asset/asset_download.html.
As with any system, patch management will play a key role in keeping your Web server secure. Products like SecureCentral's PatchQuest can automate the distribution and management of security patches, hotfixes and updates across all networks, including those that use operating systems other than Windows. You may also want to try Shavlik's HFNetChkPro for Linux, which uses the same agentless approach to patch management.
Make sure you develop and maintain a list of specific resources for security issues and software updates that work for your system and establish a procedure for monitoring these information sources.
Dig Deeper on Web Server Threats and Countermeasures
Related Q&A from Michael Cobb
Is cookie encryption enough to protect sensitive information? Expert Michael Cobb explains how salted hashes can prevent attacks, and the secure way ...continue reading
A vulnerability was found in the Blackphone's Icera modem. Expert Michael Cobb explains how attackers could hijack the device, and if this would ...continue reading
Oracle is killing off the Java browser plug-in due to security risks. Expert Michael Cobb explains the next steps for enterprises with Java-based ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.