Server Malware Protection Policy
This page describes Data Migrators’ policy on server malware protection.
- Overview
- Purpose
- Scope
- Policy
- Policy Compliance
- Exceptions
- Non-compliance
- Related Documents
- Definitions and Terms
Overview
Data Migrators is entrusted with the responsibility to provide professional management of clients servers as outlined in each of the contracts with its customers. Inherent in this responsibility is an obligation to provide appropriate protection against malware threats, such as viruses and spyware applications. Effective implementation of this policy will limit the exposure and effect of common malware threats to the systems they cover.
Purpose
The purpose of this policy is to outline which server systems are required to have anti-virus and/or anti-spyware applications.
Scope
This policy applies to all servers that Data Migrators is responsible to manage. This explicitly includes any system for which Data Migrators has a contractual obligation to administer. This also includes all server systems setup for internal use by Data Migrators, regardless of whether Data Migrators retains administrative obligation or not.
Policy
Data Migrators operations staff will adhere to this policy to determine which servers will have anti-virus and/or anti-spyware applications installed on them and to deploy such applications as appropriate.
Anti-virus
All servers MUST have an anti-virus application installed that offers real-time scanning protection to files and applications running on the target system if they meet one or more of the following conditions:
Non-administrative users have remote access capability
The system is a file server
NBT/Microsoft Share access is open to this server from systems used by non-administrative users
HTTP/FTP access is open from the Internet
Other “risky” protocols/applications are available to this system from the Internet at the discretion of the Data Migrators Security Administrator
All servers SHOULD have an anti-virus application installed that offers real-time scanning protection to files and applications running on the target system if they meet one or more of the following conditions:
- Outbound web access is available from the system
Mail Server Anti-virus
If the target system is a mail server it MUST have either an external or internal anti-virus scanning application that scans all mail destined to and from the mail server. Local anti-virus scanning applications MAY be disabled during backups if an external anti-virus application still scans inbound emails while the backup is being performed.
Anti-spyware
All servers MUST have an anti-spyware application installed that offers real-time protection to the target system if they meet one or more of the following conditions:
Any system where non-technical or non-administrative users have remote access to the system and ANY outbound access is permitted to the Internet
Any system where non-technical or non-administrative users have the ability to install software on their own
Notable Exceptions
An exception to the above standards will generally be granted with minimal resistance and documentation if one of the following notable conditions apply to this system:
The system is a SQL server
The system is used as a dedicated mail server
The system is not a Windows based platform
Policy Compliance
Compliance Measurement
The Infosec team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.
Exceptions
Any exception to the policy must be approved by the Infosec team in advance.
Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
Related Documents
None.
Definitions and Terms
The following definition and terms can be found in the SANS Glossary:
Malware
Spyware