27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

2. Background<br />

The World Wide <strong>Web</strong> is <strong>on</strong>e of the most important ways for an organizati<strong>on</strong> to publish informati<strong>on</strong>,<br />

interact with Internet users, and establish an e-commerce/e-government presence. However, if an<br />

organizati<strong>on</strong> is not rigorous in c<strong>on</strong>figuring and operating its public <strong>Web</strong> site, it may be vulnerable to a<br />

variety of security threats. Although the threats in cyberspace remain largely the same as in the physical<br />

world (e.g., fraud, theft, vandalism, and terrorism), they are far more dangerous as a result of three<br />

important developments: increased efficiency, acti<strong>on</strong> at a distance, and rapid technique propagati<strong>on</strong><br />

[Schn00].<br />

Increased Efficiency—Automati<strong>on</strong> makes attacks, even those with minimal opportunity for success,<br />

efficient and extremely profitable. For example, in the physical world, an attack that would succeed<br />

<strong>on</strong>ce in 10,000 attempts would be ineffectual because of the time and effort required, <strong>on</strong> average, for<br />

a single success. The time invested in achieving a single success would be outweighed by the time<br />

invested in the 9,999 failures. On the Internet, automati<strong>on</strong> enables the same attack to be a stunning<br />

success. Computing power and bandwidth are becoming less expensive daily, while the number of<br />

hosts that can be targeted is growing rapidly. This synergy means that almost any attack, no matter<br />

how low its success rate, will likely find many systems to exploit.<br />

Acti<strong>on</strong> at a Distance—The Internet allows acti<strong>on</strong> at a distance. The Internet has no borders, and<br />

every point <strong>on</strong> the Internet is potentially reachable from every other point. This means that an<br />

attacker in <strong>on</strong>e country can target a remote <strong>Web</strong> site in another country as easily as <strong>on</strong>e close to<br />

home.<br />

Rapid Technique Propagati<strong>on</strong>—The Internet allows for easier and more rapid technique<br />

propagati<strong>on</strong>. Before the Internet, techniques for attack were developed that would take years, if ever,<br />

to propagate, allowing time to develop effective countermeasures. Today, a new technique can be<br />

propagated within hours or days. It is now more difficult to develop effective countermeasures in a<br />

timely manner.<br />

Compromised <strong>Web</strong> sites have served as an entry point for intrusi<strong>on</strong>s into many organizati<strong>on</strong>s’ internal<br />

networks. Organizati<strong>on</strong>s can face m<strong>on</strong>etary losses, damage to reputati<strong>on</strong>, or legal acti<strong>on</strong> if an intruder<br />

successfully violates the c<strong>on</strong>fidentiality of their data. Denial of service (DoS) attacks can make it<br />

difficult, if not impossible, for users to access an organizati<strong>on</strong>’s <strong>Web</strong> site. 7 These attacks may cost the<br />

organizati<strong>on</strong> significant time and m<strong>on</strong>ey. DoS attacks are easy for attackers to attempt because of the<br />

number of possible attack vectors, the variety of automated tools available, and the low skill level needed<br />

to use the tools. DoS attacks, as well as threats of initiating DoS attacks, are also increasingly being used<br />

to blackmail organizati<strong>on</strong>s. In additi<strong>on</strong>, an organizati<strong>on</strong> can find itself in an embarrassing situati<strong>on</strong><br />

resulting from malicious intruders changing the c<strong>on</strong>tent of the organizati<strong>on</strong>’s <strong>Web</strong> pages.<br />

Kossakowski and Allen identified three main security issues related to the operati<strong>on</strong> of a publicly<br />

accessible <strong>Web</strong> site [Koss00]:<br />

Misc<strong>on</strong>figurati<strong>on</strong> or other improper operati<strong>on</strong> of the <strong>Web</strong> server, which may result, for example, in<br />

the disclosure or alterati<strong>on</strong> of proprietary or sensitive informati<strong>on</strong>. This informati<strong>on</strong> can include<br />

items such as the following:<br />

7<br />

Many DoS attacks are a result of botnets, a group of computers with a program surreptitiously installed to cause them to<br />

attack other systems. Botnets are often composed primarily of poorly secured home computers that have high-speed Internet<br />

c<strong>on</strong>nectivity. Botnets can be used to perform distributed denial of service (DDoS) attacks, which are much harder to defend<br />

against because of the large number of attacking hosts.<br />

2-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!