|
|
22. Installation Practices
The person selected to do the install should be knowledgeable regarding UNIX installations and security, and should be a known, trusted person. When using assistance from an outside source (outside your immediate group), verify the source’s credentials or identity. Review the installation procedures prior to installation and identify all security settings. The installation defaults may be insufficient or may alter existing settings. Post-installation tasks should include verification of the desired security settings. Store the installation software (disks, cd’s) and manuals in a secure location. Consider doing the installation on a test system, perhaps one without access to other systems on the network. Verify correctness of the PATH before beginning installation. Avoid using “.” in PATH for root access. Do a thorough backup before the installation. Verify the restore procedures actually work. After installation, do another thorough backup. |
|