Policy Management

Topics: Servers, Access control, Operating system Pages: 7 (1325 words) Published: August 21, 2013
Server Configuration Policy

Purpose

The purpose of this policy is to define standards, procedures, and restrictions for new servers being installed on [TT Tech High School]’s internal network(s) or related technology resources via any means. This can include, but is not limited to, the following:

• Internet servers (FTP servers, Web servers, Mail servers, Proxy servers, etc.).

• Application servers.

• Database servers.

• File servers.

• Print server.

• Third-party appliances that manage network resources.

This policy also covers any server device outsourced, co-located, or hosted at external/third-party service providers, if that equipment resides in the [ITT Tech High School].com" domain or appears to be owned by [ITT Tech High School].

The overriding goal of this policy is to reduce operating risk. The [ITT Tech High School] Server Configuration Security Policy will: • Eliminate configuration errors and reduce server outages. • Reduce undocumented server configuration changes that tend to open up security vulnerabilities. • Facilitate compliance with the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley which requires companies to institute IT controls and demonstrate that the controls are working. • Protect corporate data, networks, and databases from unauthorized use and/or malicious attack. Therefore, all new server equipment that is owned and/or operated by [ITT Tech High School ] must be provisioned and operated in a manner that adheres to company-defined processes for doing so.

Scope

This policy applies to all [ITT Tech High School] company-owned, company-operated, or company-controlled server equipment. Addition of new servers within corporate facilities will be managed at the sole discretion of IT. Non-sanctioned server installations, or use of unauthorized equipment that manage networked resources within the organizational campus, is strictly forbidden.

Responsibilities

The VP Finance of [ITT Tech. Corporate] has the overall responsibility for the confidentiality, integrity, and availability of corporate data.

The VP Finance of [[ITT Tech. Corporate] has delegated the execution and maintenance of IT and Information Systems (IS) to the Director, Information Technology.

Other IT and IS staff under the direction of the Director, Information Technology are responsible for following the procedures and policies within IT and IS.

All [ITT Tech High School] employees have the responsibility to act in accordance with company policies and procedures.

Supported Technology

All servers will be centrally managed by [ITT Tech High School]'s IT department and will utilize approved server configuration standards. Approved server configuration standards will be established and maintained by [ITT Tech High School]’s IT.

All established standards and guidelines for the [company name] Information Technology environment are documented in the Information Technology Standards and Guidelines. IT has established processes for documenting and changing Information Technology Standards and Guidelines.

Notwithstanding the “Information Technology Standards and Guidelines” the following outlines [ITT Tech High School]’s minimum system requirements for a server equipment supporting [ITT Tech High School]’s systems.

• OS configuration must be in accordance with approved Information Technology Standards and Guidelines reference, Computing Resources Section 9 – Server Operating Systems.

• Services and applications that are unused must be disabled except where approved by IT Security.

• Access to services must be logged or protected through appropriate Access Control methods.

• Security patches must be installed on the system as soon as possible through [ITT Tech High School]’s configuration management processes.

• Authorized Users must always use the standard security...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Acceptable Use Policy Essay
  • Essay on Organizational Data Privacy and Security Policy
  • security policy Essay
  • Policy Notice Essay
  • Cyber Security Policy Essay
  • The Role of Information Security Policy Essay
  • Network Domains and the Acceptable Use Policy (AUP) Research Paper
  • Security Policies: Importance, Development, Comparison, and Implementation Essay

Become a StudyMode Member

Sign Up - It's Free