Application
This unit applies to planning, designing, implementing, maintaining, monitoring and troubleshooting advanced security on network servers.
Relevant job roles include information and communications technology (ICT) network specialist, ICT network engineer, network security specialist, network security planner and network security designer.
Prerequisites
Not applicable.
Elements and Performance Criteria
1. Plan advanced network-server security according to business needs | 1.1 Consult with client and key stakeholders to identify security requirements in an advanced network server environment 1.2 Analyse and review existing client security documentation and predict network service vulnerabilities 1.3 Research network authentication and network service configuration options and implications to produce network security solutions 1.4 Ensure features and capabilities of network service security options meet the business needs 1.5 Produce or update server security design documentation to include new solutions 1.6 Obtain sign-off for the security design from the appropriate person |
2. Prepare for network-server security implementation | 2.1 Prepare for work in line with site-specific safety requirements and enterprise OHS processes and procedures 2.2 Identify safety hazards and implement risk control measures in consultation with appropriate personnel 2.3 Consult appropriate person to ensure the task is coordinated effectively with others involved at the worksite 2.4 Back up server before implementing configuration changes |
3. Configure the advanced network-server security according to design | 3.1 Configure update services to provide automatic updates to ensure maximum security and reliability 3.2 Configure network authentication, authorisation and accounting services to log and prevent unauthorised access to the server 3.3 Configure basic service security and access control lists to limit access to authorised users, groups or networks 3.4 Implement encryption as required by the design 3.5 Configure advanced network service security options for services and remote access 3.6 Configure the operating system or third-party firewall to filter traffic in line with security requirements 3.7 Ensure security of server logs and log servers are appropriately implemented for system integrity 3.8 Implement backup and recovery methods to enable restoration capability in the event of a disaster |
4. Monitor and test network-server security | 4.1 Test server to assess the effectiveness of network service security according to agreed design plan 4.2 Monitor server logs, network traffic and open ports to detect possible intrusions 4.3 Monitor important files to detect unauthorised modifications 4.4 Investigate and verify alleged violations of server or data security and privacy breaches 4.5 Recover from, report and document security breaches according to security policies and procedures 4.6 Evaluate monitored results and reports to implement and test improvement actions required to maintain the required level of network service security |
Required Skills
Required skills
communication skills to liaise with internal and external personnel on security-related matters
literacy skills to:
interpret technical documentation
write reports in required formats
read and interpret enterprise security procedures, policies and specifications
review vendor sites, bulletins and notifications for security information
planning and organisational skills to:
plan control methods for network service security and authentication
plan, prioritise and monitor own work
problem-solving and contingency-management skills to:
adapt configuration procedures to requirements of network service security and reconfigure depending on differing operational contingencies, risk situations and environments
detect, investigate and recover from security breaches
safety-awareness skills to:
apply precautions and required action to minimise, control or eliminate hazards that may exist during work activities
follow enterprise OHS procedures
work systematically with required attention to detail without injury to self or others, or damage to goods or equipment
research skills to interrogate vendor databases and websites to implement different configuration requirements to meet security levels
technical skills to:
design network service and authentication security
identify the technical requirements, constraints and manageability issues for given customer server-security requirements
implement security strategies
install network service and authentication security design
monitor log files for security information
select and use server and network diagnostics
test server security.
Required knowledge
auditing and penetration testing techniques
best practice procedures for implementing backup and restore
cryptographic techniques
procedures for error and event logging and reporting
intrusion detection and recovery procedures
network service configuration, including DNS, DHCP, web, mail, FTP, SMB, NTP and proxy
network service security features, options and limitations
network service vulnerabilities
operating system help and support utilities
planning, configuration, monitoring and troubleshooting techniques
security protection mechanisms
security threats and risks
server firewall configuration
server monitoring and troubleshooting tools and techniques, including network monitoring and diagnostic utilities
user authentication and directory services.
Evidence Required
The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.
Overview of assessment | |
Critical aspects for assessment and evidence required to demonstrate competency in this unit | Evidence of the ability to: identify network service security vulnerabilities and appropriate controls plan, design and configure a secure network authentication service secure a wide range of network services to ensure server and data security including: DNS, web and proxy, mail, FTP and firewall implement cryptographic techniques monitor the server for security breaches. |
Context of and specific resources for assessment | Assessment must ensure access to: site where server installation may be conducted relevant server specifications: cabling networked (LAN) computers server diagnostic software switch client requirements WAN service point of presence workstations relevant regulatory documentation that impacts on installation activities appropriate learning and assessment support when required modified equipment for people with special needs. |
Method of assessment | A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit: evaluation of security design report for a server with complex network service security requirements direct observation of the candidate configuring complex security requirements verbal or written questioning of required skills and knowledge evaluation of prepared report outlining intrusion detection, recovery, reporting and documentation procedures evaluation of system design and implementation in terms of network service security and suitability for business needs. |
Guidance information for assessment | Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate. Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed. Indigenous people and other people from a non-English speaking background may need additional support. In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge. |
Range Statement
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Client may include: | external organisations ICT company individuals internal departments internal employees service industry. |
Stakeholders may include: | development team IT manager or representative project team sponsor user. |
Network server may include: | applications server communications server content and media server multiple servers physical server virtual server. |
Client security documentation may include: | risk assessment reports security incident reports and server logs security plans security policies security procedures. |
Network authentication may include: | biometrics enterprise single sign-on Hesiod Kerberos lightweight directory access protocol (LDAP) Novell Directory Services (NDS) network information service (NIS) pluggable authentication modules (PAM) public key authentication (PKA) public key infrastructure (PKI) and digital certificates Red Hat Directory Services (RHDS) security tokens and smart cards SMB or Samba software two-factor and multifactor authentication Windows Active Directory Services (WADS). |
Network service may include: | dynamic host configuration protocol (DHCP) dynamic name system (DNS) firewall file transfer protocol (FTP) hypertext transfer protocol (HTTP) or secure (HTTPS) internet message access protocol (IMAP) network authentication: remote procedure call (RPC) NIS Kerberos network file system (NFS) network time protocol (NTP) open source secure shell software suite (open SSH) post-office protocol (POP) print services proxy server messages block (SMB) simple mail transfer protocol (SMTP) simple network management protocol (SNMP) structured query language server (SQL) transmission control protocol or internet protocol (TCP/IP). |
Appropriate person may include: | authorised business representative client representative from the IT department supervisor security manager. |
Update services may include: | Potentially Unwanted Program Remover (PUP) Red Hat Network Windows Server Update Services Yellow Dog Update Manager (YUM). |
Basic service security may include: | host-based access control network service access control lists (ACL) network service authentication network share permissions security-enhanced Linux (SE Linux) TCP wrappers Windows group policy eXtended interNET Daemon (xinetd) and service limits. |
Encryption may include: | asymmetric encryption certificate authority configuration digital signatures and signature verification email encryption encrypted file systems encrypted network traffic GNU Privacy Guard (GnuPG or GPG) public key infrastructure (PKI) secure sockets layer (SSL) certificates symmetric encryption. |
Security options for services may include: | network file services security options, such as: disk quotas distributed file system security encrypted file systems NFS security shares and their permissions SMB or Samba security options name resolution services, such as: bogus servers and blackholes DNS topologies dynamic DNS security restrictive zone transfers and recursive queries transaction signatures transaction signature (TSIG) views web and proxy services, such as: authentication common gateway interface (CGI) security server-side includes SSL certificates suEXEC mail services, such as: email encryption mail filtering including spam filtering mail topology design secure sockets layer and transport layer security protocols (SSL/TLS) start transport layer security (STARTTLS) virus scanning FTP services, such as: anonymous FTP FTP authentication secure access to home directories. |
Remote access security options may include: | dial-up internet connection sharing (ICS) inbound and outbound filters network address translation (NAT) open SSH port forwarding remote authentication dial-in user service (RADIUS) RADIUS proxy remote access policy routing and remote access services (RRAS) secure remote access protocols secure wireless terminal services virtual private network (VPN). |
Operating system may include: | Linux Unix Windows server. |
Third-party firewall may include: | incoming and outgoing traffic filtering iptables internet security and acceleration (ISA) server kernel level firewalls Microsoft Windows Firewall netfilter SmoothWall traffic filtering by ports and protocols. |
Backup and recovery may include: | automated backups using operating system backup and job scheduling tools backup and recovery of mail systems backup and recovery of network directory service objects backups using third party software database backup and recovery volume shadow copies. |
Sectors
Networking
Employability Skills
This unit contains employability skills.
Licensing Information
No licensing, legislative, regulatory or certification requirements apply to this unit at the time of endorsement but users should confirm requirements with the relevant federal, state or territory authority.