Patching | Recurring Task | Based on National Vulnerability Database (NVD) ratings, apply high severity security patches within seven days of publish and all other security patches within 90 days. Use a supported OS version. | Required for low risk servers | Required for moderate risk servers | Required for high risk servers |
---|
Vulnerability Management | Recurring Task | Perform a monthly Qualys scan. Remediate severity 4 and 5 vulnerabilities within seven days of discovery and severity 3 vulnerabilities within 90 days. | Required for low risk servers | Required for moderate risk servers | Required for high risk servers |
---|
Inventory | Recurring Task | Review and update NetDB, SUSI, and department/MinSec inventory records quarterly. Maximum of one node per NetDB record. | Required for low risk servers | Required for moderate risk servers | Required for high risk servers |
---|
Firewall | | Enable host-based firewall in default deny mode and permit the minimum necessary services. | Required for low risk servers | Required for moderate risk servers | Required for high risk servers |
---|
Credentials and Access Control | Recurring Task | Review existing accounts and privileges quarterly. Enforce password complexity. Logins with SUNet credentials via Kerberos recommended. | Required for low risk servers | Required for moderate risk servers | Required for high risk servers |
---|
Two-Step Authentication | | Require Duo two-step authentication for all user and administrator logins. | | Required for moderate risk servers | Required for high risk servers |
---|
Centralized Logging | | Forward logs to a remote log server. University IT Splunk service recommended. | | Required for moderate risk servers | Required for high risk servers |
---|
Sysadmin Training | Recurring Task | Attend at least one Stanford Information Security Academy training course annually. | | Required for moderate risk servers | Required for high risk servers |
---|
Malware Protection | Recurring Task | Deploy Crowdstrike. Review alerts as they are received. | | Required for moderate risk servers | Required for high risk servers |
---|
Intrusion Detection | Recurring Task | Deploy OSSEC or Tripwire. Review alerts as they are received. | | Required for moderate risk servers | Required for high risk servers |
---|
Physical Protection | | Place system hardware in a data center. | | Required for moderate risk servers | Required for high risk servers |
---|
Secure Admin Workstation | | Access administrative accounts only through a Privileged Access Workstation (PAW) or Cardinal Protect workstation. A PAW is required for ring0 access. | | | Required for high risk servers |
---|
Security, Privacy, and Legal Review | | Follow the Data Risk Assessment process and implement recommendations prior to deployment. | | | Required for high risk servers |
---|
Regulated Data Security Controls | | Implement PCI DSS, HIPAA, or export controls as applicable. | | | Required for high risk servers |
---|