27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

In many instances, most or all of the above-menti<strong>on</strong>ed functi<strong>on</strong>ality is combined in a single device, which<br />

is frequently referred to as a reverse proxy. 15<br />

In organizati<strong>on</strong>s requiring complicated dynamic <strong>Web</strong> sites, the security appliance c<strong>on</strong>figurati<strong>on</strong> may be<br />

complex, which could cause c<strong>on</strong>figurati<strong>on</strong> errors that reduce the effectiveness of the appliance. It is<br />

important to practice defense-in-depth to ensure that any vulnerabilities present in the security appliance<br />

or its c<strong>on</strong>figurati<strong>on</strong> do not adversely affect the organizati<strong>on</strong> as a whole.<br />

An additi<strong>on</strong>al challenge presented by appliance devices is that they often employ comm<strong>on</strong>ly used opensource<br />

software. This is normally not a problem, but it can become <strong>on</strong>e when a vulnerability is found in<br />

the underlying software because it is frequently not possible to use the patch released by the open-source<br />

software group. Comm<strong>on</strong> reas<strong>on</strong>s for this inability to use the patch include possible violati<strong>on</strong>s of the<br />

licensing or support agreements with the appliance manufacturer, and technical problems in applying<br />

updates to the appliance (e.g., administrators often do not have OS-level access to appliances). Therefore,<br />

appliances can be open to attack for a l<strong>on</strong>ger period of time than n<strong>on</strong>-appliance systems because of the<br />

additi<strong>on</strong>al delay involved in appliance manufacturers developing, testing, and releasing patches. Another<br />

possible problem with appliances is that they usually do not allow the installati<strong>on</strong> of additi<strong>on</strong>al software<br />

for administrati<strong>on</strong> or for security, such as antivirus software or host-based intrusi<strong>on</strong> detecti<strong>on</strong> agents.<br />

The following are some issues to c<strong>on</strong>sider when c<strong>on</strong>templating the purchase of a <strong>Web</strong> appliance:<br />

What is the underlying OS and how has it fared in security testing?<br />

How has the appliance itself fared in security testing? (Note that the c<strong>on</strong>figurati<strong>on</strong> opti<strong>on</strong>s of <strong>Web</strong><br />

appliances are necessarily limited, so a <strong>Web</strong> appliance will generally <strong>on</strong>ly be as secure as its default<br />

installati<strong>on</strong> c<strong>on</strong>figurati<strong>on</strong>.)<br />

How heterogeneous is the organizati<strong>on</strong>’s <strong>Web</strong> server infrastructure? (Different brands of appliances<br />

may not work well together.)<br />

Are the expansi<strong>on</strong> opti<strong>on</strong>s inherent in the appliance acceptable to the organizati<strong>on</strong>? (Organizati<strong>on</strong>s<br />

that are anticipating or experiencing rapid growth in <strong>Web</strong> traffic may not want to limit themselves to<br />

a single appliance or appliance vendor.)<br />

How difficult is it to c<strong>on</strong>figure the appliance? Is the appliance flexible enough to meet the<br />

organizati<strong>on</strong>’s needs?<br />

How quickly does the manufacturer resp<strong>on</strong>d to and provide patches for potential vulnerabilities?<br />

Is the underlying software used <strong>on</strong> the appliance proprietary, open source, or a combinati<strong>on</strong> of both?<br />

How l<strong>on</strong>g will the manufacturer support the appliance and what is the manufacturer’s history of<br />

support for legacy appliances?<br />

3.6.3 Pre-Hardened Operating Systems and <strong>Web</strong> <strong>Servers</strong><br />

A growing number of pre-hardened OS and <strong>Web</strong> server packages are being distributed today. These<br />

packages include an OS and <strong>Web</strong> server applicati<strong>on</strong> that are modified and pre-c<strong>on</strong>figured to provide high<br />

security. Some of these packages include the hardware platform, while others are software distributi<strong>on</strong>s<br />

15<br />

This is not meant to imply that all reverse proxies are appliance-based; in fact, many are not.<br />

3-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!