Support Silicon Dojo at: https://www.donorbox.org/etcg http://www.silicondojo.com/ Layered Security Introduction Layering Security Got Root? Site Survey and Initial Audit What are we looking at? Verify what you are told is true is in fact true. Communicate with all parties and make sure everyone is on the same page. Security is as much ART as it is a Science. “Good Security” is in the eye of the check writer… Operational Security Securing HOW your organization runs Physical Security Locks Doors Walls Patch Management Update OS, Software, Firmware on computers, servers AND DEVICES Patch Management Solutions Software Privileges Keep people from modifying records Accounts Within Quickbooks Database Apps Security Policy OS Level Security Active Directory is AMAZEBALLS Lock down abilities to: Change network settings Install Software Use USB ports Sharing Permissions Do you have permission to delete the folder that contains the database that you don’t have permission to login to? Password Policy / Multi Factor Authentication DON’T CHECK YOUR EMAIL WITH AN ADMIN ACCOUNT!!! Expiration Time Period Password Reuse Password Complexity Antivirus / Antimalware/ Antispyware Verify what your solution does Central Management Proper License? Scaleable? Standardization Firewalls Make sure you don’t break something Make sure you understand your environment Should you use a Firewall, or turn off server services (Should SSH be available?) Layered Networking Siloing Servers Subnet Logical Business Units or Physical Locations Parallel Networking in “Converged” Environments Understand how VLANs work and Vulnerabilities in your equipment Services Server Services FTP HTTP VPN Administrative Services SNMP ICMP Backups Not necessarily to tape Backup of Database tables Disaster Recovery How long until services are accessible? Failover DRaaS Intrusion Detection Honey Pots Systems to detect intrusions and issues Service Agreements HELP!!! Auditing Never Stop Auditing!