Securing your RTM installation

This section describes procedures and techniques for hardening the security of your RTM installation.

RTM is based upon the latest Open Source Cacti monitoring Framework (version 1.2.4). This framework has been enhanced significantly to reduce the likelihood of common CWE attacks such as SQL Injection, through validation techniques. This includes the use of request validation and statements and Cross Site Scripting (XSS) in its various forms through the use of CSRF validation and output validation and filtering. As such, RTM 10.2 is the most secure RTM version to date.

However, there are numerous other hardening techniques that make sense in most installations, especially when planning to host an RTM server in a more publicly accessible location. This section discusses most of these techniques in enough detail so that an RTM Administrator may learn what to avoid and will guide them through the various techniques.

Armed with these techniques, depending on corporate requirements, an RTM server can be made as secure as required to meet corporate security standards.