dcsimg

Find an IT Download

General Server Security Policy Guide

Servers hold some of your enterprise's most valuable information: R&D, personally identifiable information, and corporate financial data. This guide covers the most important issues in locking down your servers.


356 KB | 3 files | null PDF,null DOC

An organization's servers provide a wide variety of services to internal and external users, and many servers also store or process sensitive information for the organization. Some of the most common types of servers are Web, email, database, infrastructure management, and file servers. Servers are frequently targeted by attackers because of the value of their data and services. For example, a server might contain personally identifiable information that could be used to perform identity theft. This publication addresses the general security issues of typical servers.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • General Server Security Guide.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More

Recent IT Downloads
Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic conce...Read More