Skip to Content Skip to Local Navigation Skip to Global Navigation
Stanford Medicine Information Resources
& Technology

Innovative technology solutions

Building a Secure Server

As part of the School of Medicine Security Initiative, we need current and correct information about all devices that store Stanford data. This includes both "endpoint" devices (laptops, desktops, mobile devices) and now, servers. 

Just as the Data Security Program has a Device Survey for your endpoint devices, there's now a project to inventory the servers on campus. It's important to complete the inventory step as part of the process of securing your server. If you are the listed user or administrator for a server (whether it's located in the Stanford Data Center or not), you must fill out the Server Inventory Survey. (Please fill out a separate record for each individual server.)

Getting Started

All servers on campus must conform to School of Medicine minimum security standards, whether hosted by IRT or otherwise. If you are running a server that is not physically located in the data center, you will need to make sure that you're following Stanford policies about keeping the data properly secured. You may also choose to have your server moved to the data center and hosted or managed by IRT. Wherever it's physically located, you want to make sure that it's correctly configured for good security.

Think your server might be compromised (aka, hacked)? Here are some things to check.

Data Classification: High, Moderate, and Low Risk

A first priority in the planning and management of your server is what kind of data it's going to be storing. As of May 2015, a new set of classifications has been established and is now in effect for Stanford data: High Risk, Moderate Risk, and Low Risk. (The former framework - Prohibited, Restricted, Confidential, and Unrestricted - will be phased out by January 2016.)

Visit the Stanford ITS page of Minimum Security Standards, for a handy chart outlining the details of each classification of information. The new Data Classification page also has a list of examples of servers and applications that may similarly be classified High, Moderate, or Low Risk, based on the kinds of information they deal with.

All servers on campus must meet the minimum security standards for the correct risk classification.

 

Examples of High Risk servers and applications:

  • Departmental email servers
  • Active Directory
  • DNS
  • HR application that stores employee SSNs
  • Application that stores campus network node information
  • Application collecting personal information of donor, alumnus, or other individual
  • Application that processes credit card payments
  • Servers or applications using High Risk data

 

Examples of Moderate Risk servers and applications:

  • Database of non-public contracts
  • File server containing non-public procedures/documentation
  • Server storing student records
  • HR application that stores salary information
  • Directory with phone numbers, email addresses, and titles
  • University application that distributes information in the event of a campus emergency
  • Online application for student admissions
  • Server storing Moderate Risk data

 

Examples of Low Risk servers and applications:

  • Servers used for research computing purposes without involving Moderate or High Risk data
  • File server used to store published public data
  • Database server containing SUNetIDs only
  • Online maps
  • University online catalog displaying academic course descriptions
  • Bus schedules

 

Security Procedures

Standard for ALL servers:

Patching:

  • Keep your version of the operating system up to date; you should be running the most recent stable version.
  • Install the all the latest security patches for your system and applications.

 

Inventory:

  • Fill out the survey, and create a record in NetDB (update quarterly)

 

Firewall:

  • Make sure that your server has a firewall running all the time.
  • Protect traffic coming in AND going out (ingress and egress protection); it can stop both incoming and outgoing attacks even when you're not aware of it.
  • Keep track of what ports are open and why.
  • Know how to block and unblock an IP.

 

Control Access to Server:

  • Remove, disable or change passwords to default accounts.
  • All passwords should be strong passwords; they should also be unique, and changed periodically.
  • Disable "guest" accounts/access.
  • For data center-hosted servers, all administrative accounts must be SUNet ID accounts.
  • Remove inactive user accounts regularly.
  • Keep a complete list of everyone who has access to the server, and make sure you know who has which read/write privileges.
  • No open file-sharing is allowed.
  • All remote access should be restricted to specific IP addresses, and encrypted from end to end (via VPN).

 

Review Processes and Remove Extra Software

  • Know everything that runs on your server, why, and which users have access.
  • Disable any and all unused services.
  • Install anti-virus software and make sure it stays current, is running actively, and is generating logs.

 

Lock /tmp, /var/tmp, and /dev/shm partitions (linux/Unix)

  • Since /tmp, /var/tmp and /dev/shm are world writable directories, if left unlocked anyone can read/write/excute anything from these directories and it becomes a major security concern.
  • With /etc/fstab you can limit what can be done in these partitions: if you see 'defaults' beside the /tmp line, remove it and replace it with 'noexec,nosuid'. This will stop any executables from being allowed to run.
  • Do the same for /dev/shm and make /var/tmp a shortcut (symbolic link) to /tmp.

 

Lock down Your Software: PHP, Apache, etc.

  • Lock down all your applications per the vendor's best practices.
  • Use change management and version control procedures for all your software; document all changes to applications and archive previous versions, just in case.

 

Monitor your Server's Performance

  • Keep regular track of your server's normal running speed and bandwidth usage, so you can spot abnormalities.

 

Watch Out for Unusual Activity

If, while monitoring any of the above, you notice any unusual activity, your server might be compromised. If you're suspicious, check these other ways to tell if your server has been compromised.

 

Additional Requirements for High And Moderate Risk:

Physical Protection

  • If your server or its applications and data are classified High or Moderate Risk, you must locate your server in a data center.

 

Two-Step Authorization

  • Require Duo two-step authentication for all interactive user and administrator logins.

 

Centralized Logging

  • Forward logs to a remote log server. University IT Splunk service recommended.

 

Vulnerability Management

  • Monthly Qualys application scan. Remediate severity 5 vulnerabilities within 7 days, severity 4 vulnerabilities within 14 days, and severity 3 vulnerabilities within 28 days of discovery.

 

Malware Protection

  • Deploy Bit9 in high enforcement mode. Review alerts as they are received.

 

Intrusion Detection/Monitor Activity:

  • Check your logs regularly, both automated and manually, to find out about any unusual system activity.
  • IRT Security recommends running Tripwire: as the name suggests, it acts as an alert system, checking files against themselves to see if anything has been altered. (ITS also recommends Bit9 on supported platforms, otherwise OSSec.) Intrusion detection software can help identify vulnerabilities, and help establish a timeline in the event of a security incident.

 

Training

  • Attend two days of Stanford Information Security Academy training annually.

 

Secure Software Development

  • Include security as a design requirement of your applications. Review all code and correct identified security flaws before deployment. Use of static code analysis tools recommended.

 

Back Up Your Data

  • Make regular (at least weekly) encrypted backups of all data; make sure onsite AND offsite backups are kept in a physically secure environment.

 

Extra Requirements for High Risk:

Dedicated Admin Workstation

  • Access administrative accounts only via a certified Personal Bastion Host (PBH).

 

DBG Review

  • Request a Data Governance Board (DGB) review of your data and server needs, and implement recommendations before deployment.

 

Regulated Data Security Controls

  • Data is considered High Risk if it is required by law to be protected. Implement PCI DSS, HIPAA, or export controls as applicable.  

 

 

 

 

IRT Server Hosting

If you've determined that your server should be located in the data center, contact IRT Security. Someone will arrange a time to sit down with you, go through a security questionnaire and assessment, and help you with the server move. For more information about IRT's hosting and system administration requirements and services, visit the IRT Data Center Services page.

 

QUICK LINKS

Menu
Innovative technology solutions
  • Personal Computing
    • Desktop Support
      • Training Resources
      • Maintaining Your Computer
      • Print Resources
      • SUMCnet
      • Server Support
      • Printer Setup
      • Hardware Support
      • Database Support
      • New Computer Setup
      • Software Support
    • For Our Local Support Partners
    • Public Computing Services
    • Using Clinical Applications & Data
    • Network Access
      • Policies
      • Off-campus Access
      • Gaining Access to the Network
      • Wireless Access
    • Desktop Support
      • Medmeeting
      • How to Get Support
      • Get a SUNet ID
      • New Computer Setup
      • Printer Setup
      • Print Resources
      • Sustainable IT
      • SUMCnet
      • SUMCnet Subnets
      • Training Resources
      • Maintaining Your Computer
      • Server Support
      • Database Support
      • Hardware Support
      • Software Support
    • Public Computing Services
    • Recommended Software
    • Purchasing a Computer
    • Mobile Devices: Apple
    • Using Clinical Applications & Data
    • For Our Local Support Partners
    • Network Access
      • Policies
      • Off-campus Access
      • Gaining Access to the Network
      • Guest Access
      • How to find the Hardware Address of Your Device
      • Wireless Access
  • Research Technology
  • Educational Technology
    • Educational Technology Handouts
    • Learning Spaces Scheduling & Support
      • Classroom Reservations and Features
      • Room Equipment and Resources
      • Maps
      • Classroom Support
    • Instructional Technology
      • Educational Project Consultation and Development
      • Technology Training and Support
      • Video Recording Studios
      • Digital Teaching and Learning Technologies
      • Current and Completed Educational Projects
    • IRT Video Services
      • Video Production Services
      • Video Conferencing
      • Course Videocapture
      • AV Services FAQ
    • Policies
      • Video Conferencing Policy
      • Classroom Scheduling Policy
      • Classroom Video Capture Policy
      • Video Recording Permission Forms
      • Video Conferencing Policy
      • Study Spaces Policy
      • Immersive Learning Center Scheduling and Use Policies
      • Course Content Access and Appropriate use Policy
      • CourseWork Content Policies
      • Photography and Photograph Usage Policy
      • Extreme Heat Policy
    • About Us
  • Web Services
    • Websites
  • Administrative Technology
    • Guide to Administrative Systems at Stanford
    • LPCH Admin Guide to Managing Stanford Calendars
    • School of Medicine Business Intelligence Program
    • Guide to Systems By Topic
    • Acquiring or Developing a New Administrative System
    • Request a Consultation for Administrative Systems
    • Scheduled Standard Reporting
    • Scheduled Standard Reporting: Fixed Schedule - Technology for Administrative Staff - Services - Information Resources & Technology (IRT) - Stanford University School of Medicine
  • Application Services
  • Infrastructure Services & Communications
    • Firewalls
      • IRT Information Security Services
    • Desk & Mobile Phones
      • VoIP Transition
      • VoIP Deployment Schedule
    • Web Conference & Video
    • Networking
      • Network Details, Performance, & Testing
      • 802.11b Wireless Coverage
      • Off-Campus Network Access
    • Server Management
      • System Administration
      • Basic Hosting
      • Service Level Agreement
      • Facilities: Data Center
      • Customer Status Report
    • Application & Database Management
  • Information Security Services
    • Reporting a Security Incident
    • Encryption
    • Research & Security
    • For Adjunct Clinical Faculty
    • Leaving Stanford?
    • Reducing Your Risk: Handling Stanford Information
    • HIPAA Identifiers: Anonymizing Data
    • Data Classification
    • Cloud Computing
    • Mobile Device Management For Your Phone
    • Good Practices
    • How to Secure Your Information
      • Encryption Tools
      • Creating a strong password
      • Securing Laptops and Mobile Devices
      • Encryption Frequently Asked Questions
      • Encryption Exceptions
      • Encryption Deadlines
    • Why You Need to Secure Your Information
      • Information Privacy and Security Policies
    • Connecting Securely: Secure Networks and VPN
      • Stanford LAN Extension (SLE)
      • VPN Service
      • WinSecure Network
      • WinSecure - FAQ
      • Unsupported Systems
    • Building a Secure Server
      • How To Tell if Your Server Has Been Compromised
    • SPAM
    • Messaging Scams
    • Sending Information Securely
    • MedSecureSend: Sending Large Files Securely
    • Backing Up Your Information
    • FAQ: IRT Information Security Services
    • Contact Information Security
    • Security Assessments
    • Bastion Access
  • About Us
    • The IRT Team
    • Maps & Directions
      • Porter Drive
    • Key Contacts
  • Health Care
    • Find a doctor

    • Adult-care doctor
    • Pediatrician or pediatric specialist
    • Obstetrician
    • Clinics & Services

    • Adult care
    • Pediatric care
    • Obstetrics
    • Clinical trials
    • Locations

    • Stanford Health Care
    • Stanford Children's Health
    • Emergency Department
    • Dial 911 in the event of a medical emergency

    Explore Health Care

    Learn how we are healing patients through science & compassion

    Back
  • Research
    • Basic science departments
    • Clinical science departments
    • Institutes
    • Research centers
    • See full directory
    • Research Resources

    • Research administration
    • Academic profiles
    • Clinical trials
    • Funding opportunities
    • See all
    • Professional Training

    • Postdoctoral scholars
    • Clinical research fellows

    Research News

    Combination drug therapy shrinks pancreatic tumors in mice

    Combination drug therapy shrinks pancreatic tumors in mice

    Explore Research

    Learn how we are fueling innovation

    Back
  • Education
    • MD program
    • PhD programs
    • Masters programs
    • Continuing Medical Education
    • Postdoctoral scholars
    • Residencies & fellowships
    • Summer & youth programs
    • See all
    • Education Resources

    • Academic profiles
    • School Administration
    • Basic science departments
    • Clinical science departments
    • Alumni services
    • Faculty resources
    • Diversity programs
    • Lane Library
    • Student resources

    Education News

    New medical students ponder life-and-death questions

    New medical students ponder life-and-death questions

    Explore Education

    Learn how we empower tomorrow's leaders

    Back
  • Give

    Campaign for Stanford Medicine

    • Support biomedical research, education and clinical care at Stanford Medicine

    • Ways to give
    • Why giving matters
    • Make a gift online

    Stanford Children's Health

    • Support Lucile Packard Children's Hospital Stanford and child and maternal health

    • Ways to give
    • How your gift helps
    • Make an online gift
    Back
  • About
    • About us
    • News
    • Contacts
    • Maps & directions
    • Leadership
    • Vision
    • Diversity
    • Global health
    • Community engagement
    • Events
    • How you can help

    Stanford School of Medicine

    Stanford Health Care

    Stanford Children's Health

    Back
  • Site Search
©2015 Stanford Medicine
  • Terms of Use
  • See us on Facebook
  • See us on Twitter
  • Stanford University
  • Stanford School of Medicine
  • Stanford Health Care
  • Stanford Children's Health
  • Lucile Packard Children's Hospital Stanford
  • University Healthcare Alliance