Index | Directory | Calendar | Contact ASU | Campuses: Main West East Extended
  Arizona State University
  Unix Network Users Group

 Search:
  


  
Installation

UNUG Home
Up
Ports
Sendmail
tcp_wrapper
PGP
Firewalls
Linux
Sun OS
Web
setuid
tcpdump
CERT/Hacker Reports
Vendor
SSH
Monitor
Kerberos
AFS
Xhosts
r Command
su_users
Installation
Virus, Trojan, Worm, etc.
Filesystem
Passwords
Monitor Logs
Physical Security
User Management

 

22.  Installation Practices

The person selected to do the install should be knowledgeable regarding UNIX installations and security, and should be a known, trusted person. When using assistance from an outside source (outside your immediate group), verify the source’s credentials or identity.

Review the installation procedures prior to installation and identify all security settings. The installation defaults may be insufficient or may alter existing settings. Post-installation tasks should include verification of the desired security settings.

Store the installation software (disks, cd’s) and manuals in a secure location.

Consider doing the installation on a test system, perhaps one without access to other systems on the network.

Verify correctness of the PATH before beginning installation. Avoid using “.” in PATH for root access.

Do a thorough backup before the installation. Verify the restore procedures actually work. After installation, do another thorough backup.

 Copyright © Arizona Board of Regents

Updated: 10/05/00