Matt wrote:

> Kevin -
> 
> kevin bailey wrote:
>> 1. before attaching server to network install and configure tripwire.
>>
>> and could possibly put key executables on to CD-ROM and leave them in the
>> server.
> In todays same day exploits, using something like tripwire for H.I.D.S.
> may not prove useful... By the time tripwire runs a check it may already
> be too late, or the check may not return anything as the intruder could
> have cleaned up their mess by then or altered tripwire itself.  You may
> want to consider something such as SAMHAIN that performs real-time
> monitoring and will notify you immediately, as opposed to tripwire that
> will notify only 1X/day (or however often you run it).
> 
> Also consider an intrusion response plan - if Tripewire, or samhain,
> alert you - what are you going to do?  For example, we have decided that
> upon an alert the entire network will be pretty much locked down,
> disconnected from the WAN, or, at least, the compromised server is taken
> off-line until the postmortem analysis is complete and the security
> issue resolved (of course thats the 'nut shell' procedure, the real one
> is pages upon pages).  The faster you respond to the alert, the less
> potential for malicious damage.

good point - the response should be documented.

have a plan to switch to a hot-swap backup server - also backups are sent to
a backup server via rdiff-backup.

kev


> 
> Matt


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to