1 / 2

Security Recommendations

Security Recommendations. Access/Session Security Username Schema First initial of first name First 4 letters of last nope MMYY of hire date Example Bsutk0311 Password Policy 8-16 characters Must contain Special Character Number Upper case Lower case Change every 6 months

azure
Download Presentation

Security Recommendations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Recommendations • Access/Session Security • Username Schema • First initial of first name • First 4 letters of last nope • MMYY of hire date • Example • Bsutk0311 • Password Policy • 8-16 characters • Must contain • Special Character • Number • Upper case • Lower case • Change every 6 months • Can not repeat for 2 years • Physical Security • Keycard Access • Building • Stairs • Elevators • Fingerprint Access • Server Rooms • Inside Server Rooms • Server Racks are Kept Locked • Video Surveillance • Motion Detection Records Inactive Login Timeout After 20 minutes of inactivity user will be automatically logged out

  2. Risks • Power Failure • Electric service dependent on power companies • Subscribing to 2 or more companies • Install backup generators • Service Failure • AT&T guarantees 99.99% uptime • Recommend a second service provider (Sprint) • Device Failure • Always a risk when using technology • Recommend full redundancy • Allows for multiple device failure at a time • Security Failure • Always a risk when using technology • Refer to security recommendations

More Related