David,
  You have a tough job. Guarding against outside attacks is tough.
Guarding against untrusted users is tougher. Guarding against malicious
users is really tough!

  You will find most of the available documentation relates to guarding
against outside attacks - i.e. firewalls, securing ports, etc.

  Keep in mind that no existing system is completely, 100% secure and
yours is unlikely to be the first! :-) Your goals should be to try to:
    1) Minimize the number of attacks
    2) Guard against attacks, particularly those
       that require lower skill levels to execute
    3) Monitor for attempts and successful attacks
    4) Prepare for recovery after an attack
    5) Review and improve #1-#4 continuously

  A fairly easy and effective way to implement #1 is to enforce a "zero
tolerance" cracking policy. "We catch you messing with the system, your
privileges get revoked, no questions asked." This is akin  to locking
your car - doesn't even slow down the black hats but keeps the average
joe from being tempted to look through your change tray.

Implementing #2 is the tough part. Some highlights include:
    - Remove *every* piece of software that is not needed by
      the users, even if it makes your job of administration
      a little tougher - i.e. su, gcc, etc. should all go.
      Tools that can't be removed, but only root needs,
      should only be readable and executable by root - i.e.
      route, ifconfig, etc. This is a big task, but think about
      every piece of software. Why is it on my system? Who
      uses it? Why? - i.e. do your users really need ping?

    - Users should log into a chroot jail

    - Services that aren't needed, should be disabled and its
      software removed - i.e. finger.

    - REQUIRE secure passwords and REQUIRE passwords to be changed
      periodically. Yeah, I know users whine that their password
      can't be dog123! Don't use the same admin. passwords on multiple
      machines.

    - Keep the system physically secure.

    - Keep the system up to date by applying updates and patches when
      they become available. 

    - Do not publish system specs or security information. Do not
      discuss security measures... yes the much maligned 'security
      through obscurity' is a valid security procedure but ONLY
      when used in conjunction with real security measures.

  Implementing #3 is boring, time consuming and extremely important.
Tripwire, snort and any number of other admin. tools are available to
keep an eye on the system. Create a 'whitelist' of 'normal' processes
and constantly compare against the list of running processes. Actually
look at the log files.

  Don't fool yourself into thinking that you are so good that you don't
need #4. A system backup (i.e. tape) is a good start, but you will also
need a CD or floppy of known good systems tools (ps, top, ls, etc.)
should you think you have a problem.

   Have a plan in place to save the cracked system so that you can
determine how it was cracked since simply restoring the system back to a
crackable state isn't of much value.

   And finally review, review, review. Subscribe to the security mailing
lists to keep up to date on what is going on. Always be on the look out
for better ways to do everything. 

  I hope this was helpful.

Pete
   

>Appreciate any pointers, even on security in general.  T.I.A.


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.openprojects.net

Reply via email to