27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Maintaining operati<strong>on</strong>al integrity of systems by c<strong>on</strong>ducting security tests and ensuring that designated<br />

IT professi<strong>on</strong>als are c<strong>on</strong>ducting scheduled testing <strong>on</strong> critical systems.<br />

3.2.4<br />

<strong>Web</strong> Server and Network Administrators<br />

<strong>Web</strong> server administrators are system architects resp<strong>on</strong>sible for the overall design, implementati<strong>on</strong>, and<br />

maintenance of a <strong>Web</strong> server. Network administrators are resp<strong>on</strong>sible for the overall design,<br />

implementati<strong>on</strong>, and maintenance of a network. On a daily basis, <strong>Web</strong> server and network administrators<br />

c<strong>on</strong>tend with the security requirements of the specific system(s) for which they are resp<strong>on</strong>sible. Security<br />

issues and soluti<strong>on</strong>s can originate from either outside (e.g., security patches and fixes from the<br />

manufacturer or computer security incident resp<strong>on</strong>se teams) or within the organizati<strong>on</strong> (e.g., the security<br />

office). The administrators are resp<strong>on</strong>sible for the following activities associated with <strong>Web</strong> servers:<br />

Installing and c<strong>on</strong>figuring systems in compliance with the organizati<strong>on</strong>al security policies and<br />

standard system and network c<strong>on</strong>figurati<strong>on</strong>s<br />

Maintaining systems in a secure manner, including frequent backups and timely applicati<strong>on</strong> of<br />

patches<br />

M<strong>on</strong>itoring system integrity, protecti<strong>on</strong> levels, and security-related events<br />

Following up <strong>on</strong> detected security anomalies associated with their informati<strong>on</strong> system resources<br />

C<strong>on</strong>ducting security tests as required.<br />

3.2.5<br />

<strong>Web</strong> Applicati<strong>on</strong> Developers<br />

<strong>Web</strong> applicati<strong>on</strong> developers are resp<strong>on</strong>sible for the look, functi<strong>on</strong>ality, performance, and security of the<br />

<strong>Web</strong> c<strong>on</strong>tent and <strong>Web</strong>-based applicati<strong>on</strong>s they create. As menti<strong>on</strong>ed in Secti<strong>on</strong> 2, threats are increasingly<br />

directed at applicati<strong>on</strong>s instead of the underlying <strong>Web</strong> server software and OSs. Unless <strong>Web</strong> applicati<strong>on</strong><br />

developers ensure that their code takes security into c<strong>on</strong>siderati<strong>on</strong>, the <strong>Web</strong> server’s security will be weak<br />

no matter how well the server itself and the supporting infrastructure are secured. <strong>Web</strong> applicati<strong>on</strong><br />

developers should ensure the applicati<strong>on</strong>s they implement have the following characteristics:<br />

Supports a secure authenticati<strong>on</strong>, authorizati<strong>on</strong>, and access c<strong>on</strong>trol mechanism as required.<br />

Performs input validati<strong>on</strong> so that the applicati<strong>on</strong>’s security mechanisms cannot be bypassed when a<br />

malicious user tampers with data he or she sends to the applicati<strong>on</strong>, including HTTP requests,<br />

headers, query strings, cookies, form fields, and hidden fields.<br />

Processes errors in a secure manner so as not to lead to exposure of sensitive implementati<strong>on</strong><br />

informati<strong>on</strong>.<br />

Protects sensitive informati<strong>on</strong> processed and/or stored by the applicati<strong>on</strong>. Inadequate protecti<strong>on</strong> can<br />

allow data tampering and access to c<strong>on</strong>fidential informati<strong>on</strong> such as usernames, passwords, and credit<br />

card numbers.<br />

Maintains its own applicati<strong>on</strong>-specific logs. In many instances, <strong>Web</strong> server logging is not sufficient<br />

to track what a user does at the applicati<strong>on</strong> level, requiring the applicati<strong>on</strong> to maintain its own logs.<br />

Insufficient logging details can lead to a lack of knowledge about possible intrusi<strong>on</strong>s and an inability<br />

to verify a user’s acti<strong>on</strong>s (both legitimate and malicious).<br />

3-5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!