The cookbooks below are step-by-step guides to simplify adoption of the Minimum Security Standards on Moderate or High Risk servers.
Windows Servers
- Complete a Data Risk Assessment.
- Begin by submitting the DRA pre-screening form.
- Install BigFix for Servers.
- Subscribe to the service as a "BigFix for Servers Administrator" by submitting a Help ticket.
- Install BigFix for Windows Servers.
- Install the Splunk Universal Forwarder.
- Request a Splunk account by submitting a Help ticket.
- Install Splunk Universal Forwarder for Windows Servers.
- Request a Cardinal Protect System OR Privileged Access Workstation (PAW)
- Cardinal Protect and PAWs are only required for administering High Risk servers and applications.
- Install Duo for servers.
- Request your API keys and Duo API hostname by submitting a Help request.
- Deploy Two-Step Authentication for RDP on Windows Servers to your systems.
- Install CrowdStrike.
- Request an account by submitting a Help ticket.
- Configure your host-based firewall.
- Configure your firewall in default-deny mode, and permit only the minimum necessary services.
- Regularly scan for vulnerabilities with Qualys.
- Request a Qualys account by submitting a Help ticket.
- Sign in to the Qualys console to manage custom scans and reports.
- Review your compliance with the other MinSec standards.
- Apply high severity security patches within seven days of publish, and all other security patches within 90 days.
- Review and update your system inventory records in NetDB and SUSI.
- Enforce password complexity requirements and review your existing admin accounts, and their privileges.
- Physically protect your server
- Implement PCI DSS, HIPAA, FISMA, or export controls, as applicable.
Linux Servers
- Complete a Data Risk Assessment.
- Begin by submitting the DRA pre-screening form.
- Install BigFix for Servers.
- Subscribe to the service as a "BigFix for Servers Administrator" by submitting a Help ticket.
- Install BigFix for Linux Servers.
- Install the Splunk Universal Forwarder.
- Request a Splunk account by submitting a Help ticket.
- Install Splunk Universal Forwarder for Linux Servers.
- Request a Cardinal Protect system OR Privileged Access Workstation (PAW).
- Cardinal Protect and PAWs are only required for administering High Risk servers and applications.
- Install Duo for servers.
- Request your API keys and Duo API hostname by submitting a Help request.
- Deploy Duo Two-Step Authentication for SSH on Linux Servers to your systems.
- Install File Integrity Monitoring (OSSEC).
- Configure your host-based firewall.
- Configure your firewall in default-deny mode, and permit only the minimum necessary services.
- Regularly scan for vulnerabilities with Qualys.
- Request a Qualys account by submitting a Help ticket.
- Sign in to the Qualys console to manage custom scans and reports.
- Review your compliance with the other MinSec standards.
- Apply high severity security patches within seven days of publish, and all other security patches within 90 days.
- Review and update your system inventory records in NetDB and SUSI.
- Enforce password complexity requirements and review your existing admin accounts, and their privileges.
- Physically protect your server.
- Implement PCI DSS, HIPAA, FISMA, or export controls, as applicable.