27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Although informati<strong>on</strong> <strong>on</strong> public <strong>Web</strong> sites is c<strong>on</strong>tent that is intended to be public, assuming a credible<br />

review process and policy is in place, it is still important to ensure that informati<strong>on</strong> cannot be modified<br />

without authorizati<strong>on</strong>. Users of this informati<strong>on</strong> rely up<strong>on</strong> the integrity of such informati<strong>on</strong> even if the<br />

informati<strong>on</strong> is not c<strong>on</strong>fidential. Because of the public accessibility, c<strong>on</strong>tent <strong>on</strong> publicly accessible <strong>Web</strong><br />

servers is inherently more vulnerable than informati<strong>on</strong> that is inaccessible from the Internet. This<br />

vulnerability means that organizati<strong>on</strong>s need to protect public <strong>Web</strong> c<strong>on</strong>tent through the appropriate<br />

c<strong>on</strong>figurati<strong>on</strong> of <strong>Web</strong> server resource c<strong>on</strong>trols. Examples of resource c<strong>on</strong>trol practices include—<br />

Install or enable <strong>on</strong>ly necessary services.<br />

Install <strong>Web</strong> c<strong>on</strong>tent <strong>on</strong> a dedicated hard drive or logical partiti<strong>on</strong>.<br />

Limit uploads to directories that are not readable by the <strong>Web</strong> server.<br />

Define a single directory for all external scripts or programs executed as part of <strong>Web</strong> c<strong>on</strong>tent.<br />

Disable the use of hard or symbolic links.<br />

Define a complete <strong>Web</strong> c<strong>on</strong>tent access matrix that identifies which folders and files within the <strong>Web</strong><br />

server document directory are restricted and which are accessible (and by whom).<br />

Disable directory listings.<br />

Use user authenticati<strong>on</strong>, digital signatures, and other cryptographic mechanisms as appropriate.<br />

Use host-based intrusi<strong>on</strong> detecti<strong>on</strong> systems (IDS), intrusi<strong>on</strong> preventi<strong>on</strong> systems (IPS), and/or file<br />

integrity checkers to detect intrusi<strong>on</strong>s and verify <strong>Web</strong> c<strong>on</strong>tent.<br />

Protect each backend server (e.g., database server, directory server) from command injecti<strong>on</strong> attacks<br />

at both the <strong>Web</strong> server and the backend server.<br />

Organizati<strong>on</strong>s should use active c<strong>on</strong>tent judiciously after balancing the benefits gained against the<br />

associated risks.<br />

Most early <strong>Web</strong> sites presented static informati<strong>on</strong> residing <strong>on</strong> the server, typically in the form of textbased<br />

documents. So<strong>on</strong> thereafter, interactive elements were introduced to offer users new ways to<br />

interact with a <strong>Web</strong> site. Unfortunately, these same interactive elements introduced new <strong>Web</strong>-related<br />

vulnerabilities because they involve dynamically executing code <strong>on</strong> either the <strong>Web</strong> server or client using<br />

a large number of inputs, from Universal Resource Locator (URL) parameters to Hypertext Transfer<br />

Protocol (HTTP) POST c<strong>on</strong>tent and, more recently, Extensible Markup Language (XML) c<strong>on</strong>tent in the<br />

form of <strong>Web</strong> service messages. Different active c<strong>on</strong>tent technologies have different associated<br />

vulnerabilities, and their risks should be weighed against their benefits. Although most <strong>Web</strong> sites use<br />

some form of active c<strong>on</strong>tent generators, many also deliver some or all of their c<strong>on</strong>tent in a n<strong>on</strong>-active<br />

form.<br />

Organizati<strong>on</strong>s must use authenticati<strong>on</strong> and cryptographic technologies as appropriate to protect<br />

certain types of sensitive data.<br />

<strong>Public</strong> <strong>Web</strong> servers often support a range of technologies for identifying and authenticating users with<br />

differing privileges for accessing informati<strong>on</strong>. Some of these technologies are based <strong>on</strong> cryptographic<br />

functi<strong>on</strong>s that can provide an encrypted channel between a <strong>Web</strong> browser client and a <strong>Web</strong> server that<br />

ES-5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!