- Was OS loaded from an official Solaris CD?
- Are partitions large enough to accommodate patches and upgrades?
- Was Tripwire used to baseline the system before connecting it to a network?
- Is the system at he current patch level?
- Are there 2 system back ups? One on site, one off site?
- Is OpenBoot Security level set to command or full?
- Has OpenBoot banner been changed?
- Has screen autolock been turned on?
- Does the system implement Filesystem Quotas?
- Does the system have a complex permissions scheme? If so have ACL’s been implemented?
- What files/directories have SetUID bit turned on?
- Are any files with SetUID bit turned on shell scripts?
- Is there a group password that must be used with the newgrp command?
- Is root umask set to 077 or 027?
- Check system device permissions
- Use ASET, COPS, Tiger Tripwire and lsof to audit filesystem.
- Make sure no files in /etc are group or other writeable
- Make sure /var/adm/utmp and /var/adm/utmpx are 644
- Has ls command been aliased to show hidden files?
- Has rm command been aliased to ask for verification?
- Have filesystem inode numbers been randomized?
- Have daemon, lp, bin, sys, adm, uucp, nuucp, listen, nobody, and noaccess accounts been locked?
- Have sysadmin and sys groups been locked?
- Do any PATH or LD_LIBRARY_PATH statements contain “.”?
- Are permissions on /etc/passwd –rw-r—r--?
- Are permissions on /etc/shadow –r--------?
- Check /etc/default/passwd to ensure password aging and length.
- Use grpck to check consistency of /etc/group
- Are permissions on /etc/group –rw-r—r--?
- Can root log in from console only?
- Is su available only to admins?
- Are all su attemps logged?
- Is system name part of shell prompt for root and other admins?
- Has /etc/system been configured to prevent stack-based buffer overflows?
- Check /etc/default/cron and crontab files.
- Ensure that proper /etc/cron.d/cron.allow and cron.deny files are set up.
- Check /var/spool/cron/atjobs file.
- Ensure that proper /etc/cron.d/at.allow and at.deny files are set up.
- Make sure that scripts and programs launched by cron are readable only by owner.
- Are failed login attempts logged to loginlog?
- Is ip_forwarding turned off if machine is not used as a router?
- Has logcheck auditing tool been installed and used?
- Is the system configured to ignore redirects?
- If system is not used as a router, is ip_forward_directed_broadcasts turned off?
- Is ip_forward_src_routed turned off?
- Is root the only user with execute privileges for snoop?
- Has auth (identd) been disabled at the firewall by blocking TCP and UDP port 113?
- Is sendmail daemon running on a system that is not a mail server?
- Has /etc/mail/sendmail.cf been configured to prevent message source routing?
- Does only the print service have write access to the print device?
- Are only needed services running?
- Has inetd tracing been turned on?
- HasTCPWrappers been implemented?
- Make sure there is not a /etc/hosts.equiv file unless absolutely necessary.
- Has Secure Shell (ssh) been installed?
- Has anonymous ftp been turned off?
- Has ftpd logging been turned on for logging and debugging?
- Have root,uupc, and bin been added to /etc/ftpusers file to prohibit ftp connections?
- Has tftp been turned off?
- Is a GUI installed only on necessary systems?
- Is there any type of Intrusion Detection System installed?
- Has Diffie-Hellman or Kerberos Authentication been configured?
- Has IPsec been implemented?
- If DNS is used, has a Split-Horizon DNS architecture been implemented?
- If DNS is used, has BIND version been configured to stop illicit zone transfers?
- Is the latest version of BIND being used?
- If NIS is used, have NIS maps been moved out of /etc directory?
- If NIS is used, does root user have the only read and write access to /var/yp directory?
- Is NIS domain name different from DNS domain name?
- If NIS is used, has /var/yp/securenets beent implemented to make NIS maps available only to specific networks or systems?
- Are NIS clients bound to specific servers?
- Use rpcinfo –b option to detect illicit NIS servers.
- If NIS or NIS+ is used, does nsswitch.conf specify “passwd: hosts nis” or “passwd: hosts nisplus” to keep root account local?
- If NIS+ is used, ensure that there are no rights for “nobody” using niscat command.
- If NIS+ is used, does “nobody” have access rights?
- If NIS+ is used, is security level set to at least 2?
- If NIS+ is used, is it administered with admintool?
- Are all NIS+ tables backed up daily?
- Are NIS+ transactions flushed daily?
- Has nscd caching been disabled?
- If NFS is used, have systems that can mount an NFS directory been restricted with the share command in /etc/dfs/dfstab?
- Are permanent NFS client mounts set up in /etc/vfstab?
- Has NFS Portmon been set in /etc/system?
- Are any servers NFS clients?
- Have indirect automounter maps been set up?
- Is automounter browsing disabled on NFS clients?
- Have all services been commented out of /etc/inetd.conf?
- Are permissions on sulog and loginlog set to 640?
- Has /etc/issue file been created to display warning banner for telnet logins?
- Has /etc/default/login been set so that root cannot telnet into the system directly?
- Has /etc/default/telnetd been configured to remove the OS banner?
- Has /etc/default/ftpd been configured with a warning banner?
- Has the wheel group been created and su command in both /usr/bin/su and /sbin/su.static limited to it?
- Have permissions on .rhost,.netrc, and /etc/host.equiv been set to 0?
- Have TCP initial sequences been randomized by setting TCP_STRONG_ISS=2 in /etc/default/inetinit?
- Has ulimit been set to 0 in the system profile to restrict core file generation?
- Are there any unnecessary world writeable files?
- Do all users have a password set in /etc/shadow?
- Does each user have his/her own account and not a shared account?
- Does each user have a unique UID?
- Has CD-ROM drive been removed from servers after initial installation?
- Is SetUID disabled on local and remote disk partition mounts?
- Are any guest or default accounts on the system?
- Have all inactive user accounts been removed?
- Do only authorized users have write access to any bin or lib directories?
- Check for all . directories and ensure their validity.
- Have ICMP type 17 packets (MASKREQ) been blocked at the router or firewall?
:- STARTING TODAY I'LL INCLUDE MOOD OF THE DAY (MOTD) NOT MESSAGE OF THE DAY (MOTD) LIKE RESIDE IN THE UNIX SYSTEMS :)
MOTD : :-)
0 comments:
Post a Comment