8.9. Reinforcement check

8.9.1. Network Devices

  • Check the system version number in time

  • Sensitive service setting access IP/MAC whitelist

  • Enable hierarchical control of permissions

  • Turn off unnecessary services

  • Open operation log

  • Configure exception alarms

  • Turn off ICMP responses

8.9.2. Operating System

8.9.2.1. Linux

  • Useless User/User Group Check

  • Empty password account check

  • User Password Policy
    • /etc/login.defs

    • /etc/pam.d/system-auth

  • Sensitive file permission configuration
    • /etc/passwd

    • /etc/shadow

    • ~/.ssh/

    • /var/log/messages

    • /var/log/secure

    • /var/log/maillog

    • /var/log/cron

    • /var/log/spooler

    • /var/log/boot.log

  • Whether the log is turned on

  • Install patches in a timely manner

  • Auto-start
    • /etc/init.d

  • Check the system clock

8.9.2.2. Windows

  • Abnormal process monitoring

  • Abnormal startup item monitoring

  • Abnormal service monitoring

  • Configure syslog

  • User Account
    • Set password validity period

    • Set password strength limits

    • Set password retries

  • Install EMET

  • Enable PowerShell logging

  • Restrict download and execution of the following sensitive files
    • ade, adp, ani, bas, bat, chm, cmd, com, cpl, crt, hlp, ht, hta, inf, ins, isp, job, js, jse, lnk, mda, mdb, mde, mdz, msc, msi, msp, mst, pcd, pif, reg, scr, sct, shs, url, vb, vbe, vbs, wsc, wsf, wsh, exe, pif

  • The limit will call up the wscript suffix
    • bat, js, jse, vbe, vbs, wsf, wsh

  • domain
    • Restrict permissions to join a computer to a domain

    • Domain accounts use the principle of least privilege

    • Reduce the number of unnecessary privileged accounts

8.9.3. Applications

8.9.3.1. FTP

  • Disable anonymous login

  • Modify Banner

8.9.3.2. SSH

  • Whether to disable ROOT login

  • Whether to disable password connections

8.9.3.3. MySQL

  • File write permission settings

  • User authorization table management

  • Whether logging is enabled

  • Is the version up to date

8.9.4. Web Middleware

8.9.4.1. Apache

  • version number hidden

  • Is the version up to date

  • Disable some HTTP verbs

  • Close Trace

  • prohibitserver-status

  • Upload file size limit

  • Directory permission settings

  • Whether to allow route rewriting

  • Whether to allow listing

  • log configuration

  • Configure the timeout period to prevent DoS

  • Non-owner user file read and write restrictions
    • httpd.conf

    • access.log

    • error.log

8.9.4.2. Nginx

  • Disable some HTTP verbs

  • Disable directory traversal

  • Check redirect configuration

  • Configure the timeout period to prevent DoS

8.9.4.3. IIS

  • Is the version up to date

  • log configuration

  • User password configuration

  • ASP.NET function configuration

  • Configure the timeout period to prevent DoS

8.9.4.4. JBoss

  • jmx console configuration

  • web console configuration

8.9.4.5. Tomcat

  • Disable some HTTP verbs

  • Disable listing

  • Disable manager function

  • User password configuration

  • User rights configuration

  • Configure the timeout period to prevent DoS

8.9.5. Password Management Policy

  • At least 8 characters in length

  • does not exist in the existing dictionary

  • Not using knowledge-based authentication