Table of Contents |
---|
...
Panel | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
YALE-MSS-1: System ClassificationYALE-MSS-1.1: Classify the IT System and Meet the Minimum Security Standards
YALE-MSS-1.2: Apply any additional security requirements required by external obligations
YALE-MSS-1.3: Ensure appropriate contracts for all third-party relationships are in place
YALE-MSS-1.4: Designate and protect Critical IT Infrastructure
YALE-MSS-1.5: Plan for data recovery requirements
YALE-MSS-1.6: Plan for meeting and maintaining the security requirements for the IT System
YALE-MSS-1.7: Complete a Security Planning Assessment (SPA)The system owner is responsible for completing the SPA. The ITS Linux team will answer questions pertaining to the SPA, and this document lists what the ITS Linux team guarantees as part of our managed server offering. |
...
Panel | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||
YALE-MSS-5: Software SecurityYALE-MSS-5.1: Utilize an industry-standard secure configuration method
YALE-MSS-5.2: Utilize endpoint protection
YALE-MSS-5.3: Run supported software and operating systemsYALE-MSS-5.4: Ensure
YALE-MSS-5.3: Run supported software and operating systemsITS Linux runs supported software and operating systems. YALE-MSS-5.4: Ensure all software is actively supported by a vendor or open-source projectITS Linux ensures all software is actively supported by a vendor or open-source project. YALE-MSS-5.5: Manage all changes to the system through a change control process
|
...
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
YALE-MSS-6: PatchingYALE-MSS-6.1: Apply security patches regularly
|
...
Panel | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||
YALE-MSS-7: Data ProtectionYALE-MSS-7.1: Back up user-level and system-level dataMSS Guidelines |
YALE-MSS-7.2: Encrypt all electronic storage devices
YALE-MSS-7.2: Encrypt all electronic storage devices
YALE-MSS-7.3: Encrypt data in transit and at rest
YALE-MSS-7.3: Encrypt data in transit and at restYALE-MSS-7.4: Recycle IT Systems using Yale's Environmental Health and Safety (EHS) Process
YALE-MSS-7.5: Sanitize systems before re-use
YALE-MSS-7.6: All network traffic must use a strong, industry-standard encryption methodWhere possible, ITS Linux:
YALE-MSS-7.7: Purge data once it is no longer requiredYALE-MSS-Linux has 30 day retention policy when decommission a system. After 30 days, the system data and any application is erased. Exports of application data are honored by request. YALE-MSS-7.8: Utilize host Data Loss Prevention (DLP)This is not applicable to Managed Linux Servers. YALE-MSS-7.9: Use inactivity locksApplication owners should research and apply inactivity locks suitable for their application security level. YALE-MSS-7.10: Store Yale Data within the United StatesVirtual machine data and managed physical Linux server data is stored within the United States. YALE-MSS-7.11: Use secure BluetoothYALE-This is not applicable to Managed Linux Servers. YALE-MSS-7.12: Enroll in a remote wipe capabilityThis is not applicable to Managed Linux Servers. YALE-MSS-7.13: No circumvention of device security ("Jailbreaking")This is not applicable to Managed Linux Servers. |
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
YALE-MSS-8: Application Development SecurityYALE-MSS-8.1: Follow an appropriate secure development methodology when writing softwareThis is not applicable to Managed Linux Servers. YALE-MSS-8.2: Test for security vulnerabilities when any changes are made to the systemManaged Linux servers are scanned daily via Nessus. ISO provides access to Nessus reports to identify security vulnerabilities. Application owners may have items listed in the daily report mentioned above that should be addressed. |
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
YALE-MSS-9: Authentication and AuthorizationYALE-MSS-9.1: Ensure all account types are uniquely authenticatedYALE-MSS-9.2: Do not share account credentials (username/password)YALE-MSS-9.3: Utilize secure passwords for authentication | ||||||
MSS Guidelines | ITS Linux Implementation | 9.3.1: Change all account usernames and passwords from defaults | 9.3.2: Align (or surpass) password security to align with the current requirements for Net ID credentials | 9.3.3: Lock mobile devices with a password, passcode or pin | 9.3.4: Prohibit password, passcode, or pin reuse for a specified number of generations | 9.3.5: Do not reuse passwords |
MSS Guidelines | ITS Linux Implementation | YALE-MSS-9.4.1: Review all accounts with access to the system to ensure least privilege is applied | YALE-MSS-9.4.2: Maintain an inventory of all privileged and service accounts and assigned privileges | YALE-MSS-9.5: Deprovision accounts and access when roles & responsibilities change
MSS Guidelines | ITS Linux Implementation |
---|---|
9.3.1: Change all account usernames and passwords from defaults | The Linux Team changes all default passwords upon creation or installation of a service or device. The Application Team is responsible for changing default passwords on applications. |
9.3.2: Align (or surpass) password security to align with the current requirements for Net ID credentials | Access to Linux servers utilizes PKI (public/private keys). Application teams are responsible for setting password complexity. |
9.3.3: Lock mobile devices with a password, passcode or pin | The Linux Team is not responsible for mobile devices. |
9.3.4: Prohibit password, passcode, or pin reuse for a specified number of generations | Access to Linux servers utilizes PKI (public/private keys). Application teams are responsible for setting password reuse policy. |
9.3.5: Do not reuse passwords | Access to Linux servers utilizes PKI (public/private keys). |
YALE-MSS-9.4: Grant privileges to IT Systems and data according to the principle of least privilege
MSS Guidelines | ITS Linux Implementation |
---|---|
YALE-MSS-9.4.1: Review all accounts with access to the system to ensure least privilege is applied | The Linux Team reviews accounts to ensure least privilege is applied upon account creation but does not currently have a process in place to review the accounts periodically. |
YALE-MSS-9.4.2: Maintain an inventory of all privileged and service accounts and assigned privileges | The Linux Team does not currently have a process to review and remove service accounts and assigned privileges. |
YALE-MSS-9.5: Deprovision accounts and access when roles & responsibilities change
MSS Guidelines | ITS Linux Implementation |
---|---|
9.5.1: Ensure accounts are deprovisioned or altered to reflect necessary access when an individual's role or responsibilities change or a user is terminated | If the user whose role is changing is a member of the Linux Team, a change request is submitted by the Manager of the Linux Team which creates appropriate tasks to remove the user from all required systems. If the user whose role is changing is not a member of the Linux Team, it is the user's manager's responsibility to create this request. |
9.5.2: Shared service account passwords should be renewed on a routine basis or when an individual who knew the credentials no longer needs access to the account | When a member of the Linux Team changes roles or is terminated, the Linux Team will roll the root password and the password to Keepass. |
9.5.3: Identify dormant accounts and remove them on a regular basis | The Linux Team does not currently have a process to review and remove dormant and unused accounts. |
YALE-MSS-9.6: Require Multifactor Authentication (MFA) for access to authenticated systems
ITS Linux uses SSH with public key authentication.
YALE-MSS-9.7: Use University approved authentication methods
MSS Guidelines | ITS Linux Implementation |
---|---|
9. |
7.1: |
Web applications are required to use Yale credentials to utilize the University's Approved Single Sign On methods | The Linux Team is not responsible for web application authentication. |
9.7.2: For non-web applications, use Yale’s central Active Directory services. LDAP is not approved. | The Linux Team is not responsible for authentication to applications. |
YALE-MSS-9.
6: Require Multifactor Authentication (MFA) for access to authenticated systemsYALE-MSS-9.7: Use University approved authentication methods8: Secure and/or limit storage of authentication information
Passwords are not stored in source code repositories for Linux. Keypass is used to store secrets for the Linux team. Importing secrets into Jenkins and Ansible is documented.
Application owners will need to assess secret management within their own teams.
MSS Guidelines | ITS Linux Implementation |
---|---|
9. |
8.1: |
Document secrets management decisions and operational practices | Decisions are documented in Confluence and appropriate repositories. Work is logged in ServiceNow. |
YALE-MSS-9.
8: Secure and/or limit storage of authentication information9: Allow only encrypted network protocols for authentication
MSS Guidelines | ITS Linux Implementation |
---|---|
9. |
9.1: |
YALE-MSS-9.9: Allow only encrypted network protocols for authentication
MSS Guidelines | ITS Linux Implementation |
---|---|
9.9.1: Use industry standard authentication protocolsUse industry standard authentication protocols | Managed Linux uses only the secured ports which is "https" (443) and we always recommend end-to-end encryption for applications. Protocols and ciphers are reviewed periodically and adjusted where needed. For Linux administrators, SSH private/public key infrastructure is used for access to all Linux systems. |
YALE-MSS-9.10: Prevent brute force attacks
MSS Guidelines | ITS Linux Implementation |
---|---|
9.10.1: Implement rate limiting or failed authentication lockouts | The Linux Team does not currently have any controls to prevent Brute Force attacks. |
YALE-MSS-9.11: Use administrative and service accounts for their IT function only
MSS Guidelines | ITS Linux Implementation |
---|---|
9.11.1: Adjustment of privileged account permissions should be performed by the provider of the account and never the user of the account or a third-party | Any privilege account escalation is performed by the Managed Servers Linux team. Access to escalate one's own privilege is not accessible to users. |
YALE-MSS-9.12: Ensure authentication events are associated with an individual and not just an administrative or service account
Authentications are tracked by individual Net IDs.
The "root" user cannot be logged into directly on any Linux system. Linux administrators log in using their own ID and any account privilege escalation is logged via system logs.
MSS Guidelines | ITS Linux Implementation |
---|---|
9.12.1: Disable direct login with generic, shared account names ("root", "administrator", "dba", "sa"). The login accounts must meet the account requirements outlined in Yale-MSS-9.3. | Where applicable, Linux disables direct login to service & shared accounts in favor of user login with switch user privileges. |
9.12.2: Do not allow direct logins to accounts with administrative privileges. Require users to log in with an individual account and log in with an individual account and escalate privileges. | ITS Linux requires login with NetID and then escalate privileges. |
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
YALE-MSS-10: Network ExposureYALE-MSS-10.1: Enable ports, protocols, and services on an as needed basisNetwork ExposureYALE-MSS-10.1: Enable ports, protocols, and services on an as needed basisAll the securities are behind the Yale firewall and ports are opened only as needed with all appropriate approvals. Specific ports are allowed based on the VLAN the system has an IP address in. These are determined by the ISO team; additional rules are requested during initial setup of the system/application. This is not done on a cadence, however firewall requests for additional port access is done on an as needed basis. YALE-MSS-10.2: Configure host firewalls to deny all unsolicited inbound traffic by defaultOn RHEL8, firewalld is enabled and only ssh and nrpe are allowed. Any additional ports that need to be opened must authorized by the team and the application owner and set through configuration management. YALE-MSS-10.3: Utilize host firewalls to control and log all inbound and outbound trafficNetwork traffic is logged and ports are opened as needed by the Linux Managed servers team through configuration management once the ports have been approved by both teams. Host based firewalls are applied when necessary. They are default on RHEL8. |
...
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
YALE-MSS-11: Security TrainingYALE-MSS-11.1: Require security training for all users of Yale Data and Yale IT Systems
YALE-MSS-11.2: Ensure all third parties complete required training
|
...
Panel | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
YALE-MSS-12: Intrusion DetectionYALE-MSS-12.1: Capture inbound and outbound network flow dataInbound/Outbound traffic flow is captured by appliances managed by the security team. YALE-MSS-12.2: Utilize a network firewall to allow the least amount of access possibleof access possibleAll the systems are behind firewall.
YALE-MSS-12.3: Implement an Intrusion Detection and Prevention SystemThe ISO team manages the Intrusion Protection System. |
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
YALE-MSS-13: LoggingYALE-MSS-13.1: Ensure logging contains information required for incident response | ||||||
MSS Guidelines | ITS Linux Implementation |
MSS Guidelines | ITS Linux Implementation |
---|---|
13.1.1: Use multiple time servers | The Linux Manged servers team uses clock1.net.yale.edu, clock2. net.yale.edu and clock3.net.yale.edu as time sources. |
13.1.1: Use multiple time servers13.1.2: Ensure client IP addresses are not obscured by load balancers and reverse proxies2: Ensure client IP addresses are not obscured by load balancers and reverse proxies | Direct access to linux systems will be recorded with the source address. By default, all VIPs in the load balancer have X-Forwaded-For (XFF) enabled so that source ip addresses can be identified. A project is ongoing to remediate all outstanding VIPs that do not have XFF enabled. |
13.1.3: Ensure adequate space to log data. Logs should be kept for a minimum of 90 days. | Logging space is monitored and additional space is added when necessary before space is exhausted. Logs are only kept for 30 days in Graylog. |
YALE-MSS-13.2: Log all authentication events
Users logging to systems are tracked in audit.log file
MSS Guidelines | ITS Linux Implementation |
---|---|
13.2.1: Collect logs that include all authentication and privileged escalation eventsevents | Users logging to systems are tracked in /var/log/secure file |
YALE-MSS-13.3: Ensure logs are forwarded to a log server in addition to the in-scope system
All the logs are forwarded to Graylog. Adequate permissions are set for users through Grouper in order to access the logs where they can access the required information.
YALE-MSS-13.4: Collect and review all source system activity logs
Users logging to systems are tracked in audit.log file
MSS Guidelines | ITS Linux Implementation |
---|---|
13.4.1: Identify, track, and periodically audit source systems for compliance with all applicable laws, regulations, and University policies, standards, and procedures | The Linux Manged servers team does not currently have a process to audit all Linux servers. Specific servers (i.e. Banner) are audited by a third party annually. |
13.4.2: Collect log data needed for Information System Activity Review | Data is collected in /var/log/secure and in a central logging system. It includes all necessary information for a Security Activity Review and is available on-demand. |
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
YALE-MSS-14: Security Incident ReportingYALE-MSS-14.1: Report any suspected security incidents to the Information Security Team in a timely manner suspected security incidents to the Information Security Team in a timely mannerSecurity incidents will be reported to the Information Security Team via a ServiceNow incident with all available information. Depending on the severity of the security incident, the team may reach out directly to the security team via phone, Teams, etc.
YALE-MSS-14.2: YALE-MSS-14.2: Identify the system's primary security contactBased on the tagging information available on the respective node in VMWare, we will be contacting the client accordingly. Information for physical systems is identified in the CMDB. |