Sample Asset Protection Standards:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 2: Line 2:


Technical standards guides provide a security overview, as well as list requirements with detailed descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirements.<br>
Technical standards guides provide a security overview, as well as list requirements with detailed descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirements.<br>
<br>
*[[Oracle Database Asset Protection Standards:|'''Oracle Database Asset Protection Standards''']]<br>
:The Oracle Database Asset Protection Standards detail specific best practices for configuring Oracle database systems to support the protection objectives established in the Asset Protection Policy.<br>
<br>
<br>
*[[Internet Protocol (IP) Router Asset Protection Standards:|'''Internet Protocol (IP) Router Asset Protection Standards''']]<br>
*[[Internet Protocol (IP) Router Asset Protection Standards:|'''Internet Protocol (IP) Router Asset Protection Standards''']]<br>

Latest revision as of 15:27, 16 November 2006

Technical Standards Guides

Technical standards guides provide a security overview, as well as list requirements with detailed descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirements.

The Oracle Database Asset Protection Standards detail specific best practices for configuring Oracle database systems to support the protection objectives established in the Asset Protection Policy.


The Internet Protocol (IP) Router Asset Protection Standards detail specific best practices for configuring and hardening IP routers to support the protection objectives established in the Asset Protection Policy.


The 802.11 Wireless Ethernet Asset Protection Standards detail specific best practices for configuring and hardening 802.11 Wireless Ethernet LANs to support the protection objectives established in the Asset Protection Policy.


The Firewall Asset Protection Standards detail specific best practices for configuring and hardening firewalls to support the protection objectives established in the Asset Protection Policy.


The Internet Information Services (IIS) Asset Protection Standards detail specific best practices for configuring and hardening IIS to support the protection objectives established in the Asset Protection Policy.


The Apache Asset Protection Standards detail specific best practices for configuring and hardening Apache to support the protection objectives established in the Asset Protection Policy.


The Web Server Asset Protection Standards detail specific best practices for configuring and hardening Web servers to support the protection objectives established in the Asset Protection Policy.


The Windows 2000 Asset Protection Standards detail specific best practices for configuring and hardening Windows 2000 to support the protection objectives established in the Asset Protection Policy.


The Windows 2003 Asset Protection Standards detail specific best practices for configuring and hardening Windows 2003 to support the protection objectives established in the Asset Protection Policy.


The Windows XP Asset Protection Standards detail specific best practices for configuring and hardening Windows XP to support the protection objections established in the Asset Protection Policy.


The Solaris Asset Protection Standards detail specific best practices for configuring and hardening Solaris to support the protection objections established in the Asset Protection Policy.


The Linux Asset Protection Standards detail specific best practices for configuring and hardening Linux to support the protection objections established in the Asset Protection Policy.


The Novell NetWare Asset Protection Standards detail specific best practices for configuring and hardening Novell NetWare 4.x and 5.x to support the protection objectives established in the Asset Protection Policy.


The IBM OS/400 Asset Protection Standards detail specific best practices for configuring and hardening IBM OS/400 to support the protection objectives established in the Asset Protection Policy.


--Mdpeters 16:01, 28 August 2006 (EDT)