Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note

All users are responsible for the security of their computers per Campus and UC Network Policies and Procedures outlined by the following:

(These are outlined also at: UCSB Network Policy and Procedures)

Requirements

Proper Allowance of Access and Use

As outlined in the University of California Electronic Communications Policy:

  • Access is to be restricted to University Users (As defined as University students, staff, faculty and affiliated with the University)
  • Public (Non-University Users) may only have access to machines that have been authorized as Public Use/Access per sponsorship by the University.

This means that any and all access to machines hosted on the campus network should not have 'open access'.

Strong Passwords and/or SSH Keys on accounts or services running on the machine

...

The definition of a 'Strong' password is:

  • Be at least 10 12 characters long (However, more is better)
  • Case sensitive (Meaning should have UPPER and lower case letters)
  • Contains a mixture of letters and numbers
  • Contains symbols (Such as #, ! and so forth...)
  • Does not use words found in any dictionary (Such as names)
  • Does not use letters or numbers in sequence or in repeated fashion (Like 1111, 1234, abcd)

(Reference: Password Management on UCSB Information Security)

If you have difficulties remembering a strong password, the alternative is to make use of SSH Keys to access the machine.

...

There are a few tutorials on how to set up fail2ban on Google, and we would recommend using this for at least protecting your SSH access to the machine.

...

Rules of Thumb

Disable what you aren't using.

...