Changes between Version 1 and Version 2 of UhlLinuxServer N3 Risk Assessment
- Timestamp:
- 08/26/16 14:27:58 (8 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
UhlLinuxServer N3 Risk Assessment
v1 v2 1 = UhlLinuxServer Risk Assessment1 = UhlLinuxServer N3 Risk Assessment 2 2 3 3 Tags: [[UhlLinuxServer]] [[Information_Governance_Category]] … … 13 13 === 1.2 Likelihood 14 14 15 - 1.2.1 The servers are available on the UHL Intranetand so an attack is unlikely15 - 1.2.1 The servers are available on the NHS N3 Network and so an attack is unlikely 16 16 17 17 === 1.3 Mitigation … … 20 20 - 1.3.2 VMs are backed up daily to allow a restore if a corruption occurs 21 21 - 1.3.3 Software is available online or from source repositories (SVN or Git) 22 - 1.3.4 The firewall only allows access to specific IP addresses 22 23 23 24 === 1.4 Improvements … … 36 37 === 2.2 Likelihood 37 38 38 - 2.2.1 The servers are available on the UHL Intranetand so an attack is unlikely39 - 2.2.1 The servers are available on the NHS N3 and so an attack is unlikely 39 40 40 41 === 2.3 Mitigation … … 43 44 - 2.3.2 Databases are backed up daily with a history of 3 months to allow for recovery 44 45 - 2.3.3 Database server can only write data to the temp and database directories 46 - 2.3.4 The firewall only allows access to specific IP addresses 45 47 46 48 === 2.4 Improvements … … 78 80 === 4.2 Likelihood 79 81 80 - 4.2.1 The servers are available on the UHL Intranetand so an attack is unlikely82 - 4.2.1 The servers are available on the NHS N3 and so an attack is unlikely 81 83 82 84 === 4.3 Mitigation … … 84 86 - 4.3.1 Enforce a strong password policy 85 87 - 4.3.2 Use LDAP authentication where possible 88 - 4.3.4 The firewall only allows access to specific IP addresses 86 89 87 90 === 4.4 Improvements … … 95 98 === 5.2 Likelihood 96 99 97 - 5.2.1 The servers are available on the UHL Intranetand so an attack is unlikely100 - 5.2.1 The servers are available on the NHS N3 Network and so an attack is unlikely 98 101 99 102 === 5.3 Mitigation … … 120 123 - 6.3.1 Software is kept up to date 121 124 - 6.3.2 Applications are run as a restricted user account that does not have permission to make configuration changes 125 - 6.3.3 The firewall only allows access to specific IP addresses 122 126 123 127 === 6.4 Improvements