Implement web-based and server security features.

Implementation should include utilizing web-based and server security features to control access to an Internet server by

  • employing password authentication schemes
  • restricting or permitting access at the IP address level
  • managing server access keys
  • disabling folder browsing
  • patching software and OS
  • testing systems for vulnerabilities.