question archive Operating Systems Security Module 4 Case Study Three Instructions   Scenario: A newly configured web server has been setup on the network by the development group

Operating Systems Security Module 4 Case Study Three Instructions   Scenario: A newly configured web server has been setup on the network by the development group

Subject:Computer SciencePrice: Bought3

Operating Systems Security

Module 4

Case Study Three Instructions

 

Scenario:

A newly configured web server has been setup on the network by the development group.  The developers are very adept at designing functional sites that are secure and aesthetically pleasing. Unfortunately, the designers have no idea how to secure the server beyond their code. Fortunately for them, your group of security analysts are here to save the day and protect the assets of C.S.E. 

 

Server Set-Up

 

The server is running a freshly installed version of Red hat Enterprise Linux 7

 

The server has been placed in the network DMZ.

 

The server is running the following tools and services: Apache, MySQL, java, php, ruby, Perl, mongoDb, Samba, FTP, Squid.

 

The website itself requires Apache, php and MySQL at a minimum to operate.  

 

No configuration of the server has been completed outside of the initial installation and setup of the website.

 

Assignment:

 

Job is to take this brand new, wide open server and harden it to a state where it is safe to put into production. 

Based on what you have learned from this course and the material in the text book, explain what changes you will need to make to the current infrastructure and why. 

You are welcome to add or remove anything you like, including the addition of other systems and devices as long as the website is still operable. 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE