Topics Map > Services > Security > Server Registration

Server Registration - Register Your Server

Step by step instructions on how to register your server.

  1. Server Requirements:
    • Account Control Plan – Strong passwords/pass-phrases are used and their use enforced. Accounts on the server are unique and those that are not needed are disabled or removed. Access to data is on a need to know basis
    • Patching Plan - Operating System Patches are installed in a timely fashion and given a priority. This plan also includes the application that the server is going to be using and any other 3rd party applications.
    • Access Controls - All servers have some network access controls enabled, capable of limiting network and Internet access to the server. The server is in a secured location with limited physical access. When possible, the applications and services will work in a non-administrative mode.
    • Malware Controls - Operating Systems that are historically susceptible to malware attacks have protection installed, enabled, and be able to be updated.
    • Logging - Operating System level and Application level events are to be logged to assist in troubleshooting and forensic investigations.
    • Backups - A plan is in place for the backup/recovery of data. Data backups should be stored in an off-site secure location.
    • Offsite Logging - Store logs in a different location or a central repository so they are not lost due to failure or breach.
    • Repurposing Plan - A plan is in place to ensure data protection, either physical destruction of the storage media or digital data destruction when the server repurposed or retired.
    • Data Encryption - Ensure that if data needs to be protected based on data classification and standards, it is encrypted both at rest and in transit.
    • Multifactor Authentication - Multifactor authentication will be used for servers handling or storing sensitive data.
  2. Fill out this form: Sharepoint Server Registration Request Form (if you do not have access to the site, please contact the IT Security Officer to be granted access)
  3. This form will put in a Server Registration Request creating several emails and a service now ticket.
  4. An Outlook Calendar Request will then be sent, Accept or Purpose a better time for the Server Assessment.
  5. Once the request has been accepted, the Service Now ticket will be sent to Network Engineering and Operations to reserve the IP address and DNS Name (if requested).
  6. You will be notified when the IP Address and DNS Name(if requested) is reserved.
  7. The 710 Document will be sent through NDSU Docusign, please complete and digitally sign the document. Copies will also be sent to the heads of your department for them to sign as well.
  8. Run Center for Internet Security Compliance Check Software, and take the remediation steps that you can, please send the results to the NDSU IT Security Officer.
    • Lynis for Linux computers - -  lynis -Q -- report-file (name of server)
    • CIS-CAT Pro for Most Operating Systems - Located in the Google Team Drive - If you need access to the Team Drive please contact
  9. Be prepared to answer the following questions about your server for the assessment:
    • What applications are installed on the server?
    • What protections you have put on the Server for data protection?
    • Who is going to be able to access the server?
    • How the Server is going to be accessed?
  10. When the Assessment is over, a Nessus scan will be levied against the server and its results sent to you.

See Also:

Keywords:security   Doc ID:99013
Owner:Marisa M.Group:IT Knowledge Base
Created:2020-03-17 14:54 CDTUpdated:2021-06-03 14:42 CDT
Sites:IT Knowledge Base
Feedback:  0   0