It’s easy enough to configure both a web server software and the firewall to 
not allow connections to/from the server from anywhere other than pre-approved 
IP addresses.  So your 4 approved people can connect in, and it can connect out 
to the servers it needs to maintain and update itself

If you want to be more restrictive, you have an air-gapped network and only the 
devices on that network can get to it.  But then you’d need separate machines 
for people who need access.  (But they can be older machines, as they just need 
to run a web browser).  So long as they’re kept isolated, security updates 
aren’t required.   You can always move security updates onto it via CD or even 
USB stick, but I’d make sure they’re scanned for viruses before hand.  (As it’s 
going to be impossible to keep the virus definitions up to date this way)

Between the two is having a parallel network, and the people with access have 
two NICs so they’re on both the main network and this identity network.  (But 
you also need to make sure they’re configured so they won’t act as a gateway 
and bridge the network).  You then need one of those machines to run DNS, 
syslog, and mirror your RPMs, virus definitions, etc

I’d also suggest running the web service at a non-standard higher port that’s 
not going to be let through any outer firewalls by default.

You can also do other weird tricks— when I worked for an ISP, we had a box that 
if it saw any traffic it would black hole that address at the router, to stop 
anyone trying to scan our network. You could do something similar if anyone 
tried scanning port 80, it triggered some sort of lockdown

You could also use port knocking so the web service didn’t accept connections 
by default.  You’d probably need to put a bookmarklet on the machines that 
should have access to send the correct pattern of unlock probes

... but I’ve been out of the sysadmin game for 5+ years now, and have only been 
dealing with ‘low’ sensitivity data for the past 15+.  It’s possible that there 
are better techniques now.  (I suspect the medical community would have similar 
issues)

-Joe

Sent from a mobile device with a crappy on screen keyboard and obnoxious 
"autocorrect"

> On Jun 10, 2021, at 4:37 PM, Sergio Letuche <[email protected]> wrote:
> 
> Greetings
> 
> We plan to use a linux server and lamp software to keep persons info that
> we must protect.
> Only 4 people in our library will have access to this server via a web
> based app via a lan.
> 
> Which flavour of linux server you would suggest to use?
> The best way to be sure our data is safe would be to keep it without any
> internet connection just to allow it to be reachable from within the local
> network.
> How you suggest we should proceed with having updates to the server
> software but also be sure noone outside our premises could "see" our server?
> 
> Thank you for any suggestions

Reply via email to