27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

C<strong>on</strong>trols—This secti<strong>on</strong> of the plan describes the c<strong>on</strong>trol measures (in place or planned) that are<br />

intended to meet the protecti<strong>on</strong> requirements of the informati<strong>on</strong> system. C<strong>on</strong>trols fall into three<br />

general categories:<br />

• Management c<strong>on</strong>trols, which focus <strong>on</strong> the management of the computer security system and the<br />

management of risk for a system.<br />

• Operati<strong>on</strong>al c<strong>on</strong>trols, which are primary implemented and executed by people (rather than<br />

systems). They often require technical or specialized expertise, and often rely up<strong>on</strong> management<br />

activities as well as technical c<strong>on</strong>trols.<br />

• Technical c<strong>on</strong>trols, which are security mechanisms that the computer system employs. The<br />

c<strong>on</strong>trols can provide automated protecti<strong>on</strong> from unauthorized access or misuse, facilitate<br />

detecti<strong>on</strong> of security violati<strong>on</strong>s, and support security requirements for applicati<strong>on</strong>s and data. The<br />

implementati<strong>on</strong> of technical c<strong>on</strong>trols, however, always requires significant operati<strong>on</strong>al<br />

c<strong>on</strong>siderati<strong>on</strong>s and should be c<strong>on</strong>sistent with the management of security within the organizati<strong>on</strong><br />

[<str<strong>on</strong>g>NIST</str<strong>on</strong>g>06a]. 14<br />

3.5 Human Resources Requirements<br />

The greatest challenge and expense in developing and securely maintaining a public <strong>Web</strong> server is<br />

providing the necessary human resources to adequately perform the required functi<strong>on</strong>s. Many<br />

organizati<strong>on</strong>s fail to fully recognize the amount of expense and skills required to field a secure public<br />

<strong>Web</strong> server. This failure often results in overworked employees and insecure systems. From the initial<br />

planning stages, organizati<strong>on</strong>s need to determine the necessary human resource requirements.<br />

Appropriate and sufficient human resources are the single most important aspect of effective <strong>Web</strong> server<br />

security. Organizati<strong>on</strong>s should also c<strong>on</strong>sider the fact that, in general, technical soluti<strong>on</strong>s are not a<br />

substitute for skilled and experienced pers<strong>on</strong>nel.<br />

When c<strong>on</strong>sidering the human resource implicati<strong>on</strong>s of developing and deploying a <strong>Web</strong> server,<br />

organizati<strong>on</strong>s should c<strong>on</strong>sider the following:<br />

Required Pers<strong>on</strong>nel—What types of pers<strong>on</strong>nel are required? This would include such positi<strong>on</strong>s as<br />

system and <strong>Web</strong> server administrators, <strong>Web</strong>masters, network administrators, and ISSOs.<br />

Required Skills—What are the required skills to adequately plan, develop, and maintain the <strong>Web</strong><br />

server in a secure manner? Examples include OS administrati<strong>on</strong>, network administrati<strong>on</strong>, active<br />

c<strong>on</strong>tent expertise, and programming.<br />

Available Pers<strong>on</strong>nel—What are the available human resources within the organizati<strong>on</strong>? In additi<strong>on</strong>,<br />

what are their current skill sets and are they sufficient for supporting the <strong>Web</strong> server? Often, an<br />

organizati<strong>on</strong> discovers that its existing human resources are not sufficient and needs to c<strong>on</strong>sider the<br />

following opti<strong>on</strong>s:<br />

• Train Current Staff—If there are pers<strong>on</strong>nel available but they do not have the requisite skills, the<br />

organizati<strong>on</strong> may choose to train the existing staff in the skills required. Although this is an<br />

excellent opti<strong>on</strong>, the organizati<strong>on</strong> should ensure that employees meet all prerequisites for training.<br />

14<br />

For more detail <strong>on</strong> management, operati<strong>on</strong>al, and technical c<strong>on</strong>trols, see <str<strong>on</strong>g>NIST</str<strong>on</strong>g> SP <str<strong>on</strong>g>800</str<strong>on</strong>g>-53 Revisi<strong>on</strong> 1, Recommended<br />

Security C<strong>on</strong>trols for Federal Informati<strong>on</strong> Systems, and <str<strong>on</strong>g>NIST</str<strong>on</strong>g> SP <str<strong>on</strong>g>800</str<strong>on</strong>g>-100, Informati<strong>on</strong> Security Handbook: A Guide for<br />

Managers (http://csrc.nist.gov/publicati<strong>on</strong>s/nistpubs/).<br />

3-8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!