issue139:mon_opinion
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue139:mon_opinion [2018/12/11 08:34] – d52fr | issue139:mon_opinion [2018/12/15 10:14] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 2: | Ligne 2: | ||
We will then go over the four pillars: P.A.N.S, Physical, Account, Network and System security. (S.N.A.P).** | We will then go over the four pillars: P.A.N.S, Physical, Account, Network and System security. (S.N.A.P).** | ||
+ | |||
+ | Alors que, dans l'UE, nous entrons dans l'ère du RGPD (Règlement général pour la protection des données), nous devons regarder la sécurité de nos boîtes Linux avec un œil critique. J' | ||
+ | |||
+ | Ensuite, nous survolerons quatre piliers : Matériel, Compte, Réseau et Sécurité du système (M.C.R.S.) (souvent désigné comme S.N.A.P, en anglais : System security, Network, Account, Physical). | ||
**The foundation of security is in understanding the concepts. I usually end up having to write policies and procedures for quasi-government entities... that they don't follow... but still need to have the paperwork if anyone asks. (Bureaucracy...). I thought it may be a good idea for the wider audience to understand security from our perspective. | **The foundation of security is in understanding the concepts. I usually end up having to write policies and procedures for quasi-government entities... that they don't follow... but still need to have the paperwork if anyone asks. (Bureaucracy...). I thought it may be a good idea for the wider audience to understand security from our perspective. | ||
Linux is considered to be a secure system, but there are a lot of factors that affect this " | Linux is considered to be a secure system, but there are a lot of factors that affect this " | ||
+ | |||
+ | Le fondement de la sécurité est dans la compréhension de ses concepts. Je finis habituellement en écrivant des règles et des procédures pour des entités quasi-gouvernementales .... qui ne les suivent pas ... mais qui ont le document papier si quelqu' | ||
+ | |||
+ | Linux est considéré comme un système sûr, mais il existe de nombreux facteurs qui affectent cet état de « sécurité ». Vous devez être informés pour prendre les bonnes décisions de sécurité. C'est ici que je vous aiderai. Je fournirai cette information. S'il vous plaît, pas de pré-supposé. Pour un assaillant, le saint Graal est toujours root. Root a le pouvoir de tout faire et partout ; ainsi, même les redoutables permissions de fichiers s' | ||
**Some of the principles I mention here are not just Linux specific; they can be applied in a much broader spectrum. When it comes to software, there is NEED vs. NICE TO HAVE. On a Linux server, if you don't need the software or service, stop it or uninstall it. Do not use the same password for everything, and do not put all your eggs in one basket. What do I mean by that? If your server runs your file sharing, and your web server, and your database, it means that if someone gains access to your web server, they now potentially have access to your files and your database. That means if your log files are stored on that same server, the ‘someone’ who gained access to your server, can delete his tracks. If you store sensitive data, it is a good idea to have multi-level authentication; | **Some of the principles I mention here are not just Linux specific; they can be applied in a much broader spectrum. When it comes to software, there is NEED vs. NICE TO HAVE. On a Linux server, if you don't need the software or service, stop it or uninstall it. Do not use the same password for everything, and do not put all your eggs in one basket. What do I mean by that? If your server runs your file sharing, and your web server, and your database, it means that if someone gains access to your web server, they now potentially have access to your files and your database. That means if your log files are stored on that same server, the ‘someone’ who gained access to your server, can delete his tracks. If you store sensitive data, it is a good idea to have multi-level authentication; | ||
+ | |||
+ | Certains des principes que je mentionne ici ne sont pas que pour Linux ; ils peuvent s' | ||
**Let’s look at Physical security: | **Let’s look at Physical security: | ||
How easy is it to access your servers? When I say physical security, I also mean virtual servers in the cloud. After all, you have to choose your cloud service provider. I am not an advocate of the new hipster server rooms where the server rooms are behind glass in the reception area or common public place. I understand that you paid a lot of good money for it and want to show it off, but I'd rather the public did not even know I had a server room.** | How easy is it to access your servers? When I say physical security, I also mean virtual servers in the cloud. After all, you have to choose your cloud service provider. I am not an advocate of the new hipster server rooms where the server rooms are behind glass in the reception area or common public place. I understand that you paid a lot of good money for it and want to show it off, but I'd rather the public did not even know I had a server room.** | ||
+ | |||
+ | Regardons la sécurité physique : | ||
+ | Est-il est facile d’accéder à vos serveurs ? Quand je dis sécurité physique, je pense aussi aux serveurs virtuels dans le nuage. Après tout, vous devez choisir votre fournisseur de services dans le nuage. Je ne suis pas l' | ||
+ | |||
**No other security matters if someone has access to your servers. ( I will not even go into the ways Linux can be compromised if someone has physical access to your servers.) Ideally, you’d want multiple layers between your servers and the outside world. My general rule of thumb is that no person enters the server room until it can be locked and someone can be held responsible to keep it locked. You want all the work in the server room done before moving the servers in. There is no use in having a locked door when you have to let painters and electricians and general labourers in to work around your servers for the next two weeks. Prioritise. CCTV is another necessity. Do not be penny wise and pound foolish. Years ago, I used to subcontract to the banks; the irony was not lost on me that the cash centres had multiple steel doors and armed guards, while the computer override was operator 20, to which I could get the password from the supervisor and transfer 100 times the money in the cash centre without an eyebrow being raised (if I were that way inclined). Your security is only as strong as its weakest link. Do not skimp on physical security. The current penalty, as per the GDPR, is up to 4% of annual global turnover or €20 Million (whichever is greater). This is the maximum fine that can be imposed for the most serious infringements. Thus adding a lock and maybe biometric scanners is a good start, though your physical security should extend beyond the server room. Virtual servers are not exempt from GDPR regulation, so assess the physical security of your cloud provider. Do not assume your cloud provider measures up, inspect. Should you run afoul of the law, the penalty is heavy. | **No other security matters if someone has access to your servers. ( I will not even go into the ways Linux can be compromised if someone has physical access to your servers.) Ideally, you’d want multiple layers between your servers and the outside world. My general rule of thumb is that no person enters the server room until it can be locked and someone can be held responsible to keep it locked. You want all the work in the server room done before moving the servers in. There is no use in having a locked door when you have to let painters and electricians and general labourers in to work around your servers for the next two weeks. Prioritise. CCTV is another necessity. Do not be penny wise and pound foolish. Years ago, I used to subcontract to the banks; the irony was not lost on me that the cash centres had multiple steel doors and armed guards, while the computer override was operator 20, to which I could get the password from the supervisor and transfer 100 times the money in the cash centre without an eyebrow being raised (if I were that way inclined). Your security is only as strong as its weakest link. Do not skimp on physical security. The current penalty, as per the GDPR, is up to 4% of annual global turnover or €20 Million (whichever is greater). This is the maximum fine that can be imposed for the most serious infringements. Thus adding a lock and maybe biometric scanners is a good start, though your physical security should extend beyond the server room. Virtual servers are not exempt from GDPR regulation, so assess the physical security of your cloud provider. Do not assume your cloud provider measures up, inspect. Should you run afoul of the law, the penalty is heavy. | ||
Join us again next issue as we look at the next part of P.A.N.S. (or S.N.A.P – whichever you prefer) ** | Join us again next issue as we look at the next part of P.A.N.S. (or S.N.A.P – whichever you prefer) ** | ||
+ | |||
+ | |||
+ | Aucun autre sujet de sécurité n'a d' | ||
+ | |||
+ | Retrouvez-nous dans le prochain numéro pour regarder la partie suivante des S.N.A.P. (ou M.C.R.S., si vous préférez). | ||
issue139/mon_opinion.1544513650.txt.gz · Dernière modification : 2018/12/11 08:34 de d52fr