


{"id":3552,"date":"2015-02-10T14:20:09","date_gmt":"2015-02-10T21:20:09","guid":{"rendered":"https:\/\/xmission.com\/blog\/?p=3552"},"modified":"2015-02-10T14:20:09","modified_gmt":"2015-02-10T21:20:09","slug":"7-tips-for-aspiring-systems-administrators-who-also-like-to-sleep-at-night","status":"publish","type":"post","link":"https:\/\/xmission.com\/blog\/2015\/02\/10\/7-tips-for-aspiring-systems-administrators-who-also-like-to-sleep-at-night","title":{"rendered":"7 tips for aspiring systems administrators who also like to sleep at night"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/xmission.com\/blog\/wp-content\/uploads\/2015\/02\/admin-nap.jpg\" alt=\"admin-nap\" width=\"200\" height=\"200\" class=\"alignright size-full wp-image-3557\" srcset=\"https:\/\/xmission.com\/blog\/wp-content\/uploads\/2015\/02\/admin-nap.jpg 200w, https:\/\/xmission.com\/blog\/wp-content\/uploads\/2015\/02\/admin-nap-150x150.jpg 150w, https:\/\/xmission.com\/blog\/wp-content\/uploads\/2015\/02\/admin-nap-120x120.jpg 120w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>Nobody likes to get a call in the middle of the night that the company web site is down, or worse, hacked. It&#8217;s one of the key reasons why businesses often choose managed hosting solutions, after all. Of course, not all web sites can be run by someone else and in many cases administrating your own servers in a colocation facility makes solid sense.<\/p>\n<p>Even so, what about security and reliability? While web site performance matters, it doesn&#8217;t cause panic the way a hacked or broken site can. Your boss probably won&#8217;t fire you because the home page takes an extra second to load. Typically, you can upgrade hardware to readily speed up a server. It&#8217;s easy. Security and reliability, on the other hand, require more skill.<\/p>\n<p>In this short post I want to merely touch upon best practices which can help aspiring systems administrators sleep at night as well. This list also provides less technically savvy managers and business owners an overview of what their IT staff should already be doing.<\/p>\n<p><strong>Standardize<\/strong><br \/>\nSome things can&#8217;t be so easily fixed later and require forethought and planning. Standardize, document, and automate everything you can, including installations. Deploy a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Preboot_Execution_Environment\">PXE<\/a>\u00a0system and standardize all of your servers with the same OS, kernel, and software versions as strictly as you can. Do everything the same and you&#8217;ll have far less to keep track of, spend less time managing updates, and experience fewer surprises.<\/p>\n<p><strong>Hardening<\/strong><br \/>\nLock down absolutely as much as you can: ports, software, software modules, everything. Restrictions here improve both reliability and security. UC Berkeley&#8217;s server hardening guide provides\u00a0a good example: <a href=\"https:\/\/security.berkeley.edu\/node\/143\">https:\/\/security.berkeley.edu\/node\/143<\/a><\/p>\n<p><strong>Monitoring<\/strong><br \/>\nAutomated monitoring, logging, and reporting can help you find a problem early on and potentially give you a chance to mitigate a problem before it gets serious. Even if you don&#8217;t catch it soon enough, logging can help you determine what went wrong so you can more quickly fix things. <a href=\"https:\/\/www.icinga.org\/\">Icinga<\/a>\u00a0is an excellent open source monitoring and notification system.<\/p>\n<p><strong>Backups<\/strong><br \/>\nInsurance is only appreciated once things have gone all-to-hell but then its more important than anything else. Automatically and regularly store encrypted copies of your data, both on site and off, because worst case scenarios really do happen and when it does you&#8217;ll be a hero if you have backups.<\/p>\n<p><strong>Security<\/strong><br \/>\nGood security requires far more detail than what I can touch upon here. At a minimum, always choose software with a good track record for security, setup a firewall, and encrypt your data. I also strongly encourage using an Intrusion Detection System (IDS) and conducting penetration detection quarterly. <a href=\"http:\/\/www.nist.gov\/\">NIST<\/a>&#8216;s <a href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-123\/SP800-123.pdf\">Guide to General Server Security<\/a> is a good place to start.<\/p>\n<p><strong>Redundancy<\/strong><br \/>\nWithin reason, always seek to minimize single points of failure. Things like power supplies and hard drives are known to fail so build resilient servers that can handle such things. Run redundant ethernet drops and power circuits too. Need even more redundancy? Build a <a href=\"http:\/\/en.wikipedia.org\/wiki\/High_availability\">High Availability<\/a> server infrastructure and you&#8217;ll be adding scalability too.<\/p>\n<p><strong>Compliancy<\/strong><br \/>\nTypically, systems administrators don&#8217;t care for compliancy audits and certifications. It can seem like jumping through hoops that don&#8217;t always seem applicable to their environments. Ultimately, though, audits such as <a href=\"https:\/\/www.pcisecuritystandards.org\/\">PCI<\/a>, <a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/\">HIPAA<\/a>, <a href=\"http:\/\/www.aicpa.org\/Research\/Standards\/AuditAttest\/DownloadableDocuments\/AT-00801.pdf\">SSAE 16<\/a>, <a href=\"http:\/\/www.iso.org\/iso\/home\/standards\/management-standards\/iso27001.htm\">ISO 27001<\/a> are based on computer forensics from real world data breaches. Whether inconvenient or not, having outside experts review your policies and procedures and test your environment makes a lot of sense. It can also help you get customers who require\u00a0compliancy\u00a0audits.<\/p>\n<p>Here at <a href=\"https:\/\/xmission.com\/\" target=\"_blank\">XMission<\/a>, we&#8217;ve been administrating servers and running our <a href=\"https:\/\/xmission.com\/colocation\" target=\"_blank\">data center<\/a> for years. <a href=\"https:\/\/xmission.com\/contact\" target=\"_blank\">Contact us<\/a>\u00a0toll free by phone (1-877-964-7746) or email (sales@xmission.com) today and find out how we can help you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nobody likes to get a call in the middle of the night that the company web site is down, or worse, hacked. It&#8217;s one of the key reasons why businesses often choose managed hosting solutions, after all. Of course, not all web sites can be run by someone else and in many cases administrating your [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[245,180,3,352,130,5],"tags":[],"class_list":["post-3552","post","type-post","status-publish","format-standard","hentry","category-data-center-2","category-hosting","category-security-safety","category-system-administration","category-tech","category-tips-helpful-information"],"_links":{"self":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts\/3552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/comments?post=3552"}],"version-history":[{"count":6,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts\/3552\/revisions"}],"predecessor-version":[{"id":6268,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts\/3552\/revisions\/6268"}],"wp:attachment":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/media?parent=3552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/categories?post=3552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/tags?post=3552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}