Prevention of DOS Attacks ------------------------- The following list shows measures implemented in |VOSS Automate| to protect the system against Denial of Service (DOS) attacks: * Firewall protection: * TCP flood protection against: * the SSH port * web server ports * SYN flood protection * Configurable session limits for the |VOSS Automate| platform SSH access is **Sessions per user** and **Sessions per application**. An administrator can set and modify the number of SSH sessions allowed: * system-wide (default is 10 if not set) * for a user (default is 10 if not set) See SSH Session Limit for detailed information. * The usage of ports, protocols, and services are registered with the DoD PPS Database * An automated, continuous on-line monitoring of the system is implemented, with: * Audit trail creation capability in a format that a log viewing application can immediately alert personnel of any unusual or inappropriate activity with potential Information Assurance (IA) implications. * A command line command that a user can automatically disable the system if serious IA violations are detected. * Applications are monitored and notifications sent when resource conditions reach a predefined threshold indicating there may be attack occurring, for example through SNMP traps and triggers. * High disk utilization is managed due to error notifications. For log files, disk utilization is managed by: * daily log rotation * 4 weeks of backlogs * the creation of new (empty) log files after rotating old ones * log file compression * a logging restriction of 20 messages per minute * A continuous cycle of updating packages during releases is in place with notifications during updates. Commands to carry out a security check or update can be run at any time. .. |VOSS Automate| replace:: VOSS Automate .. |Unified CM| replace:: Unified CM