How to Secure a Computer Connected to a Private Network
A private network is two or more computers and/or network devices
(e.g., printer, switch, hub, router) that are not connected in any
way to the Internet or a LAN (i.e., Cold Room or Secure Data
Facility). The data will reside on a computer acting as a server.
Because the computers are not connected to the Internet or a local
or wide area network, the emphasis for securing the data on a
private network is placed on physical security of the computers and
controlling access to the data.
Here are the minimum steps you should take to secure your sensitive data on a server on a private network:
Physical Security of a Computer on a Private Network
- Configure the BIOS to boot the computer from the hard drive only. Do not allow the computer to be booted from the diskette or CD-ROM drive.
- Password protect the BIOS so changes cannot be made to the BIOS without authorization.
- Secure the computer on which your sensitive data resides in a locked room, or secure the computer to a table with a lock and cable (locking the case so the battery cannot be disconnected, which would disable the BIOS password).
Controlling Access to the Data
- Restrict access to your sensitive data to project personnel using the security features available via the operating system (e.g., login via userid/password and NTFS permissions in Windows NT/2000, ACLs in Linux and OS X).
- Require strong passwords.
- You can run L0phtcrack to look for bad passwords.
- Enable password complexity (Windows 2000, Windows XP)
- Password protect screen saver and activate after three minutes of inactivity.
- Install encryption software for directories containing secure data. Windows 2000 encryption is free and works well. Additional encryption software applications can be found here.
- Configure your analysis software to point temporary work files to the encrypted sensitive data directory.
- Install and periodically run a secure erasure program. This program should be run monthly and after the secure data has been removed from the computer at the end of the contract period. (Shred 2 is inexpensive and works well.)
- Do not copy or move your sensitive data out of the secured directory for any reason.


