27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

supports encrypti<strong>on</strong>. <strong>Web</strong> servers may be c<strong>on</strong>figured to use different cryptographic algorithms, providing<br />

varying levels of security and performance.<br />

Without proper user authenticati<strong>on</strong> in place, organizati<strong>on</strong>s cannot selectively restrict access to specific<br />

informati<strong>on</strong>. All informati<strong>on</strong> that resides <strong>on</strong> a public <strong>Web</strong> server is then accessible by any<strong>on</strong>e with access<br />

to the server. In additi<strong>on</strong>, without some process to authenticate the server, users of the public <strong>Web</strong> server<br />

will not be able to determine whether the server is the “authentic” <strong>Web</strong> server or a counterfeit versi<strong>on</strong><br />

operated by a malicious entity.<br />

Even with an encrypted channel and an authenticati<strong>on</strong> mechanism, it is possible that attackers may<br />

attempt to access the site via a brute force attack. Improper authenticati<strong>on</strong> techniques can allow attackers<br />

to gather valid usernames or potentially gain access to the <strong>Web</strong> site. Str<strong>on</strong>g authenticati<strong>on</strong> mechanisms<br />

can also protect against phishing and pharming attacks. Therefore, an appropriate level of authenticati<strong>on</strong><br />

should be implemented based <strong>on</strong> the sensitivity of the <strong>Web</strong> server’s users and c<strong>on</strong>tent.<br />

Organizati<strong>on</strong>s should employ their network infrastructure to help protect their public <strong>Web</strong> servers.<br />

The network infrastructure (e.g., firewalls, routers, IDSs) that supports the <strong>Web</strong> server plays a critical role<br />

in the security of the <strong>Web</strong> server. In most c<strong>on</strong>figurati<strong>on</strong>s, the network infrastructure will be the first line<br />

of defense between a public <strong>Web</strong> server and the Internet. Network design al<strong>on</strong>e, however, cannot protect<br />

a <strong>Web</strong> server. The frequency, sophisticati<strong>on</strong>, and variety of <strong>Web</strong> server attacks perpetrated today support<br />

the idea that <strong>Web</strong> server security must be implemented through layered and diverse protecti<strong>on</strong><br />

mechanisms (i.e., defense-in-depth).<br />

Organizati<strong>on</strong>s should commit to the <strong>on</strong>going process of maintaining the security of public <strong>Web</strong><br />

servers to ensure c<strong>on</strong>tinued security.<br />

Maintaining a secure <strong>Web</strong> server requires c<strong>on</strong>stant effort, resources, and vigilance from an organizati<strong>on</strong>.<br />

Securely administering a <strong>Web</strong> server <strong>on</strong> a daily basis is an essential aspect of <strong>Web</strong> server security.<br />

Maintaining the security of a <strong>Web</strong> server will usually involve the following steps:<br />

C<strong>on</strong>figuring, protecting, and analyzing log files<br />

Backing up critical informati<strong>on</strong> frequently<br />

Maintaining a protected authoritative copy of the organizati<strong>on</strong>’s <strong>Web</strong> c<strong>on</strong>tent<br />

Establishing and following procedures for recovering from compromise<br />

Testing and applying patches in a timely manner<br />

Testing security periodically.<br />

ES-6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!