Information Security Best Practices: 205 Basic Rules
9.4: File System Protection
9.4 File System Protection
File system protection is the next logical step in securing an operating system for use by multiple users. This is considered to be one of the key security requirements for C2 security. A poorly protected file system allows hackers or unscrupulous employees to gain access to files and data that may contain sensitive information.
INFOSEC Best Practice #90
System administrators must have full access to all files.
Since system administrators are called upon to help users with a variety of problems, they must be able to get at user files. This makes it important that system administrators be chosen carefully for their trustworthiness. Often system administrators are chosen strictly for their academic and experience qualifications, but they should also be evaluated on their background in terms of trustworthiness. The system administrator can be the biggest security threat to the organization if not chosen wisely. Perform background checks on system administrators.
INFOSEC Best Practice #91
Limit remote server administration to the system administrator.
Remote administration of servers is becoming a necessity in many organizations given the proliferation of servers and the reduction in information systems staff. Often, system administrators are required to administer more than one system for many departments within the organization. Remote administration allows the system manager to manage remote systems that are spread out throughout the organization without being physically present. Remote administration helps the system administrator be more efficient at the job and to solve problems quicker. Also, if there are local pseudo-system...