Server Security Policy Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life Review Owner 3 Years By June 2013 Secure Research Database Analyst Retention Change History 1 Contents Server Security Policy ............................................................................................ 1 Document Status ................................................................................................... 1 1. Introduction ..................................................................................................... 3 2. Scope ............................................................................................................. 3 3. Physical Security ............................................................................................. 3 4. Environmental Controls .................................................................................... 3 5. Logical Security ............................................................................................... 4 6. Controls against Malicious Code ...................................................................... 5 7. Software.......................................................................................................... 5 8. Monitoring ....................................................................................................... 5 9. Clock Synchronisation ..................................................................................... 6 10. Backup ........................................................................................................ 6 11. Hardware Warranties and Replacement ........................................................ 6 12. Disposal ....................................................................................................... 7 2 1. Introduction 1.1 Institute of Education purchased, installed and maintained servers provide the platform for all its IT systems and services. The physical and logical security of IOE servers is consequently a vital component in guaranteeing the confidentiality, integrity and availability of IOE’s data. 2. Scope 2.1 This policy applies to all authorised servers hosted within the Institute of Education. 2.2 This policy also applies to Storage Area Networks hosted within the IOE. 3. Physical Security 3.1 All servers will be hosted within dedicated server rooms. 3.2 All server rooms will have secure perimeters. 3.3 All server rooms will have access restricted by Access Control and additionally by barrel-lock keys. Access will be limited to members of IT Services engaged in server, network and telecommunications installation and maintenance work. 3.4 The IOE currently has 3 dedicated server rooms, situated at Level 3 in the 20 Bedford Way building, Level 6 in the 20 Bedford Way building and in the basement of 59 Gordon Square. 3.5 All servers will be marked with an individual system tag and the server name. 4. Environmental Controls 4.1 All servers will be protected from surges, spikes, sags or brownouts in the electricity supply by the use of Uninterruptible Power Supplies. 4.2 All servers will be protected from excessively high or low temperatures by temperature control. 4.3 All servers will be protected from excessively high or low humidity by humidity control. 3 4.4 All servers will be situated in racks, raising them above ground level and therefore reducing the liability of damage through flooding. 4.5 Server room air conditioning equipment will be fitted with dust filters. 4.6 All environmental control equipment will be regularly maintained. 5. Logical Security 5.1 Access to server operating systems shall only be granted to the Systems Support Group (SSG) and authorised third party suppliers. 5.2 Access to applications and storage spaces shall be tightly controlled by the use of Access Control Lists. 5.3 Remote access to server operating systems shall only be granted by default to SSG. Remote access may be granted to other authorised users on a case by case basis, where the request is made by the head of department/faculty and where the request is appropriate and necessary. 5.4 User access, where facilitated, will be provided on a basis of least privilege, tight Group Policy implementation, granular NTFS access controls and limited access to programs. 5.5 Use of utility programs is restricted to members of the Systems Support Group. 5.6 Servers will, where possible, sit on a restricted subnet, with access to other subnets only being granted via firewall. 5.7 Normally server operating systems will not be remotely accessed by external suppliers (see Remote Access Policy). 5.8 Desktop sessions on a server will automatically lock after being inactive for 10 minutes. 5.9 Desktop server sessions will only be available by encrypted Remote Desktop Protocol connections. As large processing jobs need to be undertaken within sessions, inactive sessions shall not shut down, nor will a restriction on connections times be imposed. The only method a session can be reconnected is by the re-authentication of the appropriate user account. 4 5.10 Server software and firmware will be patched in a timely manner. Noncritical and test systems will be patched first to test system and application operability. 6. Controls against Malicious Code 6.1 Anti-virus software will be installed on every server and kept up-to-date. 6.2 All servers will sit behind firewalls. 6.3 User access to server desktop environments, where required for remote desktop purposes, will be tightly controlled by Group Policy in order to block access to system programs, tools, files and processes. User access will have no administrative rights, installation rights or elevated privileges. 6.4 Internet Explorer will only run in Enhanced Security Configuration mode. 6.5 The servers will run different anti-virus software to workstations 7. Software 7.1 All software on servers must be authorised and requested by system owners. 7.2 Software on servers must only be installed by the Systems Support Group or, if granted permission in writing by the system owner, a third party. 7.3 All software installations, updates and removal will be subject to the IOE’s Change Management Policy 7.4 Regular reviews of software and data content on servers classed as mission critical must be carried out. The responsibility to initiate reviews lies with the system owner. 7.5 Unauthorized software or data will be removed. 8. Monitoring 8.1 Server status and Operating System performance, including system resource usage and bandwidth usage, shall be monitored. 5 8.2 Server hardware status shall be monitored. 8.3 Audit logs shall record user activities, exceptions and information security events. System administrator and system operator activities shall also be logged. 8.4 Logs will be held for 30 days and then deleted on a rolling basis. 8.5 Audit log information is only accessible by domain administrators. 8.6 Domain Controller logs will be exported and held on a separate server. 9. Clock Synchronisation 9.1 IOE Domain controller servers will be synchronised with an authoritative external time source – the JANET NTP time servers 9.2 Other servers will synchronise with the IOE domain controller servers. 10. Backup 10.1 All IOE servers are backed up nightly. 10.2 A differential backup is taken each night. A full backup is taken each weekend. 10.3 Nightly backups are stored for 1 week. Weekly backups are stored for 1 month. Monthly backups are stored for 1 year. Yearly backups are stored indefinitely. 10.4 Backups are to be considered a disaster recovery measure. They are not provided to restore user-deleted data. 11. Hardware Warranties and Replacement 11.1 All servers must be purchased by the relevant project, department or faculty for whom the server is required. 11.2 By default all IOE servers are provided with 3 years warranty. 11.3 Warranties may be extended for a further two years (up to a maximum of five years from the point of purchase). 6 11.4 Hardware failures on in-warranty servers will be subject to a 4 hour working day replacement service, after fault diagnosis and reporting has occurred. 11.5 At the point of warranty expiration, physical servers shall be replaced 11.6 Full provision must be made by all projects, departments and faculties to fund the replacement of their servers, at the point of warranty expiration, through the server replacement budget. 11.7 All production servers must be in warranty 12. Disposal 12.1 When servers are removed from service, their hard drives will be removed and degaussed before disposal. 12.2 Memory will also be removed from the chassis. 7