Minimum Standards for Security of Devices on UCInet
Appendix A - (DRAFT)
Summary: The following minimum standards
are required for devices connected to UCInet.
- Software patch updates
Networked devices must run software for which security patches are
available in a timely manner. They must also have all currently available
security patches installed. Exceptions may be made for patches
that affect the usability of the device, critical applications, or
attached devices. See
the Exceptions section of this policy for more information
on how to get an exception.
- Anti-virus software
Anti-virus software available for any type of device
must be installed, running and up-to-date on every device,
including clients, file servers, mail servers, and other types
of networked devices.
- Host-based firewall software
Host-based firewall software available for any type
of device must be running and configured on every device, including
clients, file servers, mail servers, and other types of networked
devices. Departmental firewalls do not necessarily obviate
the need for host-based firewalls.
- Passwords
Campus network service providers must have a suitable
process for authorizing any use of shared services under their
control. Most
of the time this is referred to as an “account”.
- No user accounts shall exist without passwords or some other authentication
system (e.g. smart cards). These measures must meet the minimum complexity
requirements specified in the Implementation guidelines.
- Where possible, devices must be configured to enforce the minimum
password complexity requirements.
- All default passwords for network - access able devices accounts
must be modified.
- Passwords used for privileged access must not be the same as those
used for non- privileged access.
- No unencrypted authentication
Unencrypted authentication can be monitored across networks,
and the information gathered can be used to gain access to services
by unauthorized users. Therefore, all authentication over the network
must be use only encrypted authentication mechanisms. Insecure
services such as telnet, FTP, POP, and IMAP must be replaced by their
encrypted equivalents.
- No unauthenticated mail relays
No devices on UCInet may provide SMTP service that
allows unauthorized third parties to relay email messages (i.e.
neither the sender or receiver is a local address). Authentication
for use of the SMTP service must use an account and password;
authentication via IP address or domain name is not sufficient
to meet this standard.
- No unauthenticated proxy servers
Unauthenticated proxy servers may enable an attacker
to use the proxy to attack devices on or off-campus, hiding their
identity, and it may allow relaying of email spam. Therefore
no unauthenticated proxy servers are allowed. Authentication
for use of the proxy service must use an account and password;
authentication via IP address or domain name is not sufficient
to meet this standard.
- Physical security
Unauthorized physical access to an unattended device can result in
any number of unauthorized actions such as sending of email, modification
of data, etc. Where possible and appropriate, devices must be configured to “lock” and
require a user to re-authenticate if left unattended for more than 20 minutes. Physical
restraints or locking devices must be used on mobile computing devices
(laptops, PDAs, etc) to prevent theft.
- Unnecessary services
If a service is not necessary for the intended purpose or operation
of the device, that service shall not be running. This includes,
but is not limited to, services such as echo, chargen, discard,
and daytime.