NTISthis.com

Evidence Guide: ICANWK602A - Plan, configure and test advanced server based security

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICANWK602A - Plan, configure and test advanced server based security

What evidence can you provide to prove your understanding of each of the following citeria?

Plan advanced network-server security according to business needs

  1. Consult with client and key stakeholders to identify security requirements in an advanced network server environment
  2. Analyse and review existing client security documentation and predict network service vulnerabilities
  3. Research network authentication and network service configuration options and implications to produce network security solutions
  4. Ensure features and capabilities of network service security options meet the business needs
  5. Produce or update server security design documentation to include new solutions
  6. Obtain sign-off for the security design from the appropriate person
Consult with client and key stakeholders to identify security requirements in an advanced network server environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and review existing client security documentation and predict network service vulnerabilities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research network authentication and network service configuration options and implications to produce network security solutions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure features and capabilities of network service security options meet the business needs

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce or update server security design documentation to include new solutions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain sign-off for the security design from the appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prepare for network-server security implementation

  1. Prepare for work in line with site-specific safety requirements and enterprise OHS processes and procedures
  2. Identify safety hazards and implement risk control measures in consultation with appropriate personnel
  3. Consult appropriate person to ensure the task is coordinated effectively with others involved at the worksite
  4. Back up server before implementing configuration changes
Prepare for work in line with site-specific safety requirements and enterprise OHS processes and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify safety hazards and implement risk control measures in consultation with appropriate personnel

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consult appropriate person to ensure the task is coordinated effectively with others involved at the worksite

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Back up server before implementing configuration changes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure the advanced network-server security according to design

  1. Configure update services to provide automatic updates to ensure maximum security and reliability
  2. Configure network authentication, authorisation and accounting services to log and prevent unauthorised access to the server
  3. Configure basic service security and access control lists to limit access to authorised users, groups or networks
  4. Implement encryption as required by the design
  5. Configure advanced network service security options for services and remote access
  6. Configure the operating system or third-party firewall to filter traffic in line with security requirements
  7. Ensure security of server logs and log servers are appropriately implemented for system integrity
  8. Implement backup and recovery methods to enable restoration capability in the event of a disaster
Configure update services to provide automatic updates to ensure maximum security and reliability

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure network authentication, authorisation and accounting services to log and prevent unauthorised access to the server

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure basic service security and access control lists to limit access to authorised users, groups or networks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement encryption as required by the design

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure advanced network service security options for services and remote access

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure the operating system or third-party firewall to filter traffic in line with security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure security of server logs and log servers are appropriately implemented for system integrity

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement backup and recovery methods to enable restoration capability in the event of a disaster

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and test network-server security

  1. Test server to assess the effectiveness of network service security according to agreed design plan
  2. Monitor server logs, network traffic and open ports to detect possible intrusions
  3. Monitor important files to detect unauthorised modifications
  4. Investigate and verify alleged violations of server or data security and privacy breaches
  5. Recover from, report and document security breaches according to security policies and procedures
  6. Evaluate monitored results and reports to implement and test improvement actions required to maintain the required level of network service security
Test server to assess the effectiveness of network service security according to agreed design plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor server logs, network traffic and open ports to detect possible intrusions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor important files to detect unauthorised modifications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Investigate and verify alleged violations of server or data security and privacy breaches

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recover from, report and document security breaches according to security policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate monitored results and reports to implement and test improvement actions required to maintain the required level of network service security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

identify network service security vulnerabilities and appropriate controls

plan, design and configure a secure network authentication service

secure a wide range of network services to ensure server and data security including: DNS, web and proxy, mail, FTP and firewall

implement cryptographic techniques

monitor the server for security breaches.

Context of and specific resources for assessment

Assessment must ensure access to:

site where server installation may be conducted

relevant server specifications:

cabling

networked (LAN) computers

server diagnostic software

switch

client requirements

WAN service point of presence

workstations

relevant regulatory documentation that impacts on installation activities

appropriate learning and assessment support when required

modified equipment for people with special needs.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

evaluation of security design report for a server with complex network service security requirements

direct observation of the candidate configuring complex security requirements

verbal or written questioning of required skills and knowledge

evaluation of prepared report outlining intrusion detection, recovery, reporting and documentation procedures

evaluation of system design and implementation in terms of network service security and suitability for business needs.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate.

Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed.

Indigenous people and other people from a non-English speaking background may need additional support.

In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge.

Required Skills and Knowledge

Required skills

communication skills to liaise with internal and external personnel on security-related matters

literacy skills to:

interpret technical documentation

write reports in required formats

read and interpret enterprise security procedures, policies and specifications

review vendor sites, bulletins and notifications for security information

planning and organisational skills to:

plan control methods for network service security and authentication

plan, prioritise and monitor own work

problem-solving and contingency-management skills to:

adapt configuration procedures to requirements of network service security and reconfigure depending on differing operational contingencies, risk situations and environments

detect, investigate and recover from security breaches

safety-awareness skills to:

apply precautions and required action to minimise, control or eliminate hazards that may exist during work activities

follow enterprise OHS procedures

work systematically with required attention to detail without injury to self or others, or damage to goods or equipment

research skills to interrogate vendor databases and websites to implement different configuration requirements to meet security levels

technical skills to:

design network service and authentication security

identify the technical requirements, constraints and manageability issues for given customer server-security requirements

implement security strategies

install network service and authentication security design

monitor log files for security information

select and use server and network diagnostics

test server security.

Required knowledge

auditing and penetration testing techniques

best practice procedures for implementing backup and restore

cryptographic techniques

procedures for error and event logging and reporting

intrusion detection and recovery procedures

network service configuration, including DNS, DHCP, web, mail, FTP, SMB, NTP and proxy

network service security features, options and limitations

network service vulnerabilities

operating system help and support utilities

planning, configuration, monitoring and troubleshooting techniques

security protection mechanisms

security threats and risks

server firewall configuration

server monitoring and troubleshooting tools and techniques, including network monitoring and diagnostic utilities

user authentication and directory services.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Client may include:

external organisations

ICT company

individuals

internal departments

internal employees

service industry.

Stakeholders may include:

development team

IT manager or representative

project team

sponsor

user.

Network server may include:

applications server

communications server

content and media server

multiple servers

physical server

virtual server.

Client security documentation may include:

risk assessment reports

security incident reports and server logs

security plans

security policies

security procedures.

Network authentication may include:

biometrics

enterprise single sign-on

Hesiod

Kerberos

lightweight directory access protocol (LDAP)

Novell Directory Services (NDS)

network information service (NIS)

pluggable authentication modules (PAM)

public key authentication (PKA)

public key infrastructure (PKI) and digital certificates

Red Hat Directory Services (RHDS)

security tokens and smart cards

SMB or Samba software

two-factor and multifactor authentication

Windows Active Directory Services (WADS).

Network service may include:

dynamic host configuration protocol (DHCP)

dynamic name system (DNS)

firewall

file transfer protocol (FTP)

hypertext transfer protocol (HTTP) or secure (HTTPS)

internet message access protocol (IMAP)

network authentication:

remote procedure call (RPC)

NIS

Kerberos

network file system (NFS)

network time protocol (NTP)

open source secure shell software suite (open SSH)

post-office protocol (POP)

print services

proxy

server messages block (SMB)

simple mail transfer protocol (SMTP)

simple network management protocol (SNMP)

structured query language server (SQL)

transmission control protocol or internet protocol (TCP/IP).

Appropriate person may include:

authorised business representative

client

representative from the IT department

supervisor

security manager.

Update services may include:

Potentially Unwanted Program Remover (PUP)

Red Hat Network

Windows Server Update Services

Yellow Dog Update Manager (YUM).

Basic service security may include:

host-based access control

network service access control lists (ACL)

network service authentication

network share permissions

security-enhanced Linux (SE Linux)

TCP wrappers

Windows group policy

eXtended interNET Daemon (xinetd) and service limits.

Encryption may include:

asymmetric encryption

certificate authority configuration

digital signatures and signature verification

email encryption

encrypted file systems

encrypted network traffic

GNU Privacy Guard (GnuPG or GPG)

public key infrastructure (PKI)

secure sockets layer (SSL) certificates

symmetric encryption.

Security options for services may include:

network file services security options, such as:

disk quotas

distributed file system security

encrypted file systems

NFS security

shares and their permissions

SMB or Samba security options

name resolution services, such as:

bogus servers and blackholes

DNS topologies

dynamic DNS security

restrictive zone transfers and recursive queries

transaction signatures

transaction signature (TSIG)

views

web and proxy services, such as:

authentication

common gateway interface (CGI) security

server-side includes

SSL certificates

suEXEC

mail services, such as:

email encryption

mail filtering including spam filtering

mail topology design

secure sockets layer and transport layer security protocols (SSL/TLS)

start transport layer security (STARTTLS)

virus scanning

FTP services, such as:

anonymous FTP

FTP authentication

secure access to home directories.

Remote access security options may include:

dial-up

internet connection sharing (ICS)

inbound and outbound filters

network address translation (NAT)

open SSH

port forwarding

remote authentication dial-in user service (RADIUS)

RADIUS proxy

remote access policy

routing and remote access services (RRAS)

secure remote access protocols

secure wireless

terminal services

virtual private network (VPN).

Operating system may include:

Linux

Unix

Windows server.

Third-party firewall may include:

incoming and outgoing traffic filtering

iptables

internet security and acceleration (ISA) server

kernel level firewalls

Microsoft Windows Firewall

netfilter

SmoothWall

traffic filtering by ports and protocols.

Backup and recovery may include:

automated backups using operating system backup and job scheduling tools

backup and recovery of mail systems

backup and recovery of network directory service objects

backups using third party software

database backup and recovery

volume shadow copies.