{"id":959,"date":"2024-05-23T08:03:28","date_gmt":"2024-05-23T08:03:28","guid":{"rendered":"http:\/\/localhost:9000\/?page_id=959"},"modified":"2024-07-09T11:27:07","modified_gmt":"2024-07-09T11:27:07","slug":"metodiky-a-hardening","status":"publish","type":"page","link":"http:\/\/localhost:9000\/metodiky-a-hardening","title":{"rendered":"Metodiky a hardening"},"content":{"rendered":"\n
V tejto \u010dasti uv\u00e1dzame materi\u00e1ly publikovan\u00e9 \u00fatvarom CSIRT.SK.<\/p>\n\n\n\n
Tento dokument V\u00e1m umo\u017en\u00ed zisti\u0165 z\u00e1kladn\u00fd stav bezpe\u010dnosti va\u0161ich IT syst\u00e9mov. Pomocou checklistu viete odhali\u0165 nedostatky zabezpe\u010denia IT syst\u00e9mov na z\u00e1klade ktor\u00fdch ich viete odstr\u00e1ni\u0165. Verzia 1.1 z 18.11.2021. Metodika predstavuje n\u00e1vrh z\u00e1kladn\u00fdch po\u017eiadaviek na systematick\u00e9 zabezpe\u010denie informa\u010dnej bezpe\u010dnosti v organiz\u00e1cii. Verzia 2.1 z 19.10.2020. Pr\u00edru\u010dka sa zameriava na opera\u010dn\u00e9 syst\u00e9my zalo\u017een\u00e9 na Microsoft Windows NT jadre a popisuje ako hardenova\u0165 opera\u010dn\u00fd syst\u00e9m Microsoft Windows 7. Pr\u00edru\u010dka zameran\u00e1 na hardening opera\u010dn\u00e9ho syst\u00e9mu Microsoft Windows 11. Star\u0161ia pr\u00edru\u010dka sa zameriava na opera\u010dn\u00e9 syst\u00e9my zalo\u017een\u00e9 na Linuxovom jadre a popisuje ako hardenova\u0165 opera\u010dn\u00e9 syst\u00e9my RHEL 5 a Debian. Kontroln\u00fd zoznam stru\u010dne sumarizuje najd\u00f4le\u017eitej\u0161ie bezpe\u010dnostn\u00e9 aspekty pri v\u00fdvoji a prev\u00e1dzke webov\u00fdch str\u00e1nok a je mo\u017en\u00e9 ho vyu\u017ei\u0165 pri vykon\u00e1van\u00ed intern\u00e9ho auditu bezpe\u010dnosti webov\u00fdch aplik\u00e1ci\u00ed a webov\u00fdch str\u00e1nok. Informa\u010dn\u00e9 syst\u00e9my a prostriedky pou\u017e\u00edvan\u00e9 v organiz\u00e1ci\u00ed musia by\u0165 zabezpe\u010den\u00e9 tak\u00fdm sp\u00f4sobom, aby s\u0165a\u017eovali kompromit\u00e1ciu infra\u0161trukt\u00fary a aby v pr\u00edpade kompromit\u00e1cie slu\u017eby alebo syst\u00e9mu boli d\u00f4sledky incidentu minimalizovan\u00e9. To znamen\u00e1, \u017ee ak \u00fato\u010dn\u00edk kompromituje \u010das\u0165 infra\u0161trukt\u00fary, je pre neho zlo\u017eit\u00e9 dosta\u0165 sa \u010falej a kompromitova\u0165 \u010fal\u0161iu \u010das\u0165 infra\u0161trukt\u00fary \u2013 to znamen\u00e1 je obmedzen\u00e1 mo\u017enos\u0165 pivotingu. Je nutn\u00e9 implementova\u0165 viac\u00farov\u0148ov\u00fa h\u013abkov\u00fa ochranu.<\/p>\n\n\n\n Dokument Metodika pre systematick\u00e9 zabezpe\u010denie organiz\u00e1ci\u00ed verejnej spr\u00e1vy v oblasti informa\u010dnej bezpe\u010dnosti sumarizuje minim\u00e1lne opatrenia potrebn\u00e9 na zabezpe\u010denie informa\u010dn\u00fdch syst\u00e9mov a infra\u0161trukt\u00fary organiz\u00e1cie so zv\u00fd\u0161en\u00fdmi po\u017eiadavkami na bezpe\u010dnos\u0165 tak aby platili tieto princ\u00edpy.<\/p>\n\n\n\n Stiahnite si dokument Metodika pre systematick\u00e9 zabezpe\u010denie organiz\u00e1ci\u00ed verejnej spr\u00e1vy v oblasti informa\u010dnej bezpe\u010dnosti v2.1<\/a> [24.04.2024]<\/a><\/p>\n\n\n\n V star\u0161ej pr\u00edru\u010dke sa popisuj\u00fa tri z\u00e1kladne druhy \u00fatokov na webov\u00e9 aplik\u00e1cie a ochrana pred t\u00fdmito \u00fatokmi.
Metodika pre minim\u00e1lne bezpe\u010dnostn\u00e9 opatrenia kateg\u00f3rie I (302 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: v2.0, 24.04.2024]<\/p>\n\n\n\nPo\u017eiadavky na zabezpe\u010denie infra\u0161trukt\u00fary a rie\u0161enia implementovan\u00e9ho v r\u00e1mci OPII<\/h2>\n\n\n\n
Metodika PDF (374 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: v2.1, 19.10.2020]<\/p>\n\n\n\nPr\u00edru\u010dka pre hardening – Windows<\/h2>\n\n\n\n
HardeningGuideWindows7 PDF (1,37 MB)<\/a><\/p>\n\n\n\n
HardeningGuideWindows11 PDF (899 kB)<\/a><\/p>\n<\/div><\/div>\n\n\n\nPr\u00edru\u010dka pre hardening – Linux<\/h2>\n\n\n\n
HardeningGuideLinux PDF (1,33 MB)<\/a>
Pr\u00edru\u010dka zameran\u00e1 na automatizovan\u00fa konfigur\u00e1ciu syst\u00e9mov s OS Ubuntu Server, pr\u00edpadne Debian.
HardeningGuideUbuntu PDF (465 kB)<\/a><\/p>\n\n\n\nKontroln\u00fd zoznam pre bezpe\u010dnos\u0165 webov\u00fdch aplik\u00e1ci\u00ed<\/h2>\n\n\n\n
Checklist-weby PDF (329 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: 09.07.2024]<\/p>\n\n\n\nMetodika pre systematick\u00e9 zabezpe\u010denie organiz\u00e1ci\u00ed verejnej spr\u00e1vy v oblasti informa\u010dnej bezpe\u010dnosti<\/h2>\n\n\n\n
Z\u00e1kladn\u00e1 ochrana pred \u00fatokmi na web I<\/h2>\n\n\n\n
Z\u00e1kladn\u00e1OchranaWeb PDF (469 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: 24.04.2024]<\/p>\n\n\n\nOchrana pred \u00fatokmi DDoS<\/h2>\n\n\n\n