27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Identifying active hosts <strong>on</strong> a network<br />

Identifying active services (ports) <strong>on</strong> hosts and which of these are vulnerable<br />

Identifying applicati<strong>on</strong>s and banner grabbing<br />

Identifying OSs<br />

Identifying vulnerabilities associated with discovered OSs and applicati<strong>on</strong>s<br />

Testing compliance with host applicati<strong>on</strong> usage/security policies.<br />

Organizati<strong>on</strong>s should c<strong>on</strong>duct vulnerability scanning to validate that OSs and <strong>Web</strong> server applicati<strong>on</strong>s are<br />

up-to-date <strong>on</strong> security patches and software versi<strong>on</strong>s. Vulnerability scanning is a labor-intensive activity<br />

that requires a high degree of human involvement to interpret the results. It may also be disruptive to<br />

operati<strong>on</strong>s by taking up network bandwidth, slowing network resp<strong>on</strong>se times, and potentially affecting the<br />

availability of the scanned server or its applicati<strong>on</strong>s. However, vulnerability scanning is extremely<br />

important for ensuring that vulnerabilities are mitigated as so<strong>on</strong> as possible, before they are discovered<br />

and exploited by adversaries. Vulnerability scanning should be c<strong>on</strong>ducted <strong>on</strong> a weekly to m<strong>on</strong>thly basis.<br />

Many organizati<strong>on</strong>s also run a vulnerability scan whenever a new vulnerability database is released for<br />

the organizati<strong>on</strong>’s scanner applicati<strong>on</strong>. Vulnerability scanning results should be documented and<br />

discovered deficiencies should be corrected.<br />

Organizati<strong>on</strong>s should also c<strong>on</strong>sider running more than <strong>on</strong>e vulnerability scanner. As previously<br />

discussed, no scanner is able to detect all known vulnerabilities; however, using two scanners generally<br />

increases the number of vulnerabilities detected. A comm<strong>on</strong> practice is to use <strong>on</strong>e commercial and <strong>on</strong>e<br />

freeware scanner. Network-based and host-based vulnerability scanners are available for free or for a fee.<br />

9.4.2 Penetrati<strong>on</strong> Testing<br />

“Penetrati<strong>on</strong> testing is security testing in which evaluators attempt to circumvent the security features of a<br />

system based <strong>on</strong> their understanding of the system design and implementati<strong>on</strong>” [NISS99]. The purpose<br />

of penetrati<strong>on</strong> testing is to exercise system protecti<strong>on</strong>s (particularly human resp<strong>on</strong>se to attack indicati<strong>on</strong>s)<br />

by using comm<strong>on</strong> tools and techniques developed by attackers. This testing is highly recommended for<br />

complex or critical systems.<br />

Penetrati<strong>on</strong> testing can be an invaluable technique to any organizati<strong>on</strong>'s informati<strong>on</strong> security program.<br />

However, it is a very labor-intensive activity and requires great expertise to minimize the risk to targeted<br />

systems. At a minimum, it may slow the organizati<strong>on</strong>'s network resp<strong>on</strong>se time because of network<br />

mapping and vulnerability scanning. Furthermore, the possibility exists that systems may be damaged or<br />

rendered inoperable in the course of penetrati<strong>on</strong> testing. Although this risk is mitigated by the use of<br />

experienced penetrati<strong>on</strong> testers, it can never be fully eliminated.<br />

Penetrati<strong>on</strong> testing does offer the following benefits [<str<strong>on</strong>g>NIST</str<strong>on</strong>g>02b]:<br />

Tests the network using the same methodologies and tools employed by attackers<br />

Verifies whether vulnerabilities exist<br />

Goes bey<strong>on</strong>d surface vulnerabilities and dem<strong>on</strong>strates how these vulnerabilities can be exploited<br />

iteratively to gain greater access<br />

9-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!