7. Data encryption software. One item often overlooked is encryption of data while at
rest. Many solutions have recently come onto the market that offer the ability to
encrypt sensitive data such as credit-card and Social Security numbers that sit on your
file server or inside the database server. This is a huge protection in the case of
information theft or data leakage.
8. Backup and restore capabilities. Without the ability to back up and restore both
servers and clients in a timely fashion, an issue that could be resolved in short order
can quickly turn into a disaster. Backup procedures should be in place and restored
on a regular basis to verify their integrity.
9. System event logging. Event logs are significant when you’re attempting to
investigate the root cause of an issue or incident. In many cases, logging is not turned on
by default and needs to be enabled after the core installation of the host operating
system. The OS hardening guidelines for your organization should require that logging
be enabled.