If you are looking for a resource to help you through the process of hardening a Unix-based Web server, you can...
download the U.S. National Security Agency's free UNIX Security Checklist and Unix Security Technical Implementation Guide, which includes a Linux-specific section. The Center for Internet Security (CIS), also provides free Benchmark and Scoring Tools, which are available for all the major operating systems, the Apache Web server, and Oracle and SQL Server databases. All of which are continually updated as new vulnerabilities are discovered, so they can be used regularly as part of the lifecycle management process to monitor the effectiveness of your configuration.
Another tool that can be used during the design of any Web server environment, and its subsequent management, is ASSET (Automated Security Self-Evaluation Tool), available from NIST (National Institute of Standards and Technology). ASSET automates the completion of the questionnaire contained in NIST's Security Self-Assessment Guide for Information Technology Systems. The results can be used to evaluate the security of a particular system, and assess the status of your security program plan. ASSET is not subject to copyright protection, is in the public domain and can be downloaded free from http://csrc.nist.gov/asset/asset_download.html.
As with any system, patch management will play a key role in keeping your Web server secure. Products like SecureCentral's PatchQuest can automate the distribution and management of security patches, hotfixes and updates across all networks, including those that use operating systems other than Windows. You may also want to try Shavlik's HFNetChkPro for Linux, which uses the same agentless approach to patch management.
Make sure you develop and maintain a list of specific resources for security issues and software updates that work for your system and establish a procedure for monitoring these information sources.
Dig Deeper on Web Server Threats and Countermeasures
Related Q&A from Michael Cobb
Expert Michael Cobb details how to argue for a multistep secure code review process, like Microsoft SDL, and the pros of secure coding practices. Continue Reading
Researchers developed a tool to help prevent improper certificate pinning that causes security issues. Expert Michael Cobb reviews the issue and the ... Continue Reading
Google Project Zero discovered a WPAD attack that could target systems running Windows 10. Expert Michael Cobb explains how the attack works and how ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.