This document is intended to assist organizations in installing, configuring, and maintaining secure servers. More specifically, this document describes, in detail, the following practices to apply: * Securing, installing, and configuring the underlying operating system; * Securing, installing, and configuring server software: and * Maintaining the secure configuration through application of appropriate patches and upgrades, security testing, monitoring...