27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Virtualizati<strong>on</strong> allows organizati<strong>on</strong>s to reduce costs by running multiple <strong>Web</strong> servers <strong>on</strong> a single host<br />

computer and by providing a mechanism for quickly resp<strong>on</strong>ding to attacks against a <strong>Web</strong> server. The list<br />

below defines the three main types of virtual machine technology. Note that some virtualizati<strong>on</strong> software<br />

may be a hybrid implementati<strong>on</strong>, depending <strong>on</strong> the hardware and guest OSs.<br />

Full virtualizati<strong>on</strong>, which simulates all of the hardware required by the guest OS. Full virtualizati<strong>on</strong><br />

is useful in situati<strong>on</strong>s where the guest OS runs <strong>on</strong> a different machine architecture than the host. Full<br />

virtualizati<strong>on</strong> results in a significant performance hit because all commands must be emulated by<br />

software.<br />

Native virtualizati<strong>on</strong>, which simulates <strong>on</strong>ly the hardware necessary to run an unmodified guest OS.<br />

In native virtualizati<strong>on</strong>, most commands can be passed unmodified to the host computer processing<br />

unit (CPU), which reduces the performance hit.<br />

Paravirtualizati<strong>on</strong>, which does not simulate hardware. Instead, it offers an applicati<strong>on</strong> programming<br />

interface (API) that can be used by a modified guest OS, or it takes advantage of virtualizati<strong>on</strong><br />

capabilities supported by the processor.<br />

Virtualizati<strong>on</strong> adds another layer of complexity to the <strong>Web</strong> server setup. Both the host OS and guest OS<br />

need to be secured. If the virtualizati<strong>on</strong> technology supports it, a copy of each guest OS and installed<br />

<strong>Web</strong> server applicati<strong>on</strong> should be backed up to allow restorati<strong>on</strong> if an attack or other disrupti<strong>on</strong> occurs.<br />

The <strong>Web</strong> server and its guest OS, the host OS, and the virtualizati<strong>on</strong> software should all be patched in a<br />

timely manner. It is important to note that if the guest OS or applicati<strong>on</strong>s become compromised, the guest<br />

virtual machine can infect other hosts <strong>on</strong> the network as if it were a standal<strong>on</strong>e physical host. Each guest<br />

OS and associated <strong>Web</strong> server software should be c<strong>on</strong>figured and maintained following the<br />

recommendati<strong>on</strong>s in this publicati<strong>on</strong>.<br />

3.7 Checklist for Planning and Managing <strong>Web</strong> <strong>Servers</strong><br />

Completed<br />

Acti<strong>on</strong><br />

Plan the c<strong>on</strong>figurati<strong>on</strong> and deployment of the <strong>Web</strong> server<br />

Identify functi<strong>on</strong>s of the <strong>Web</strong> server<br />

Identify categories of informati<strong>on</strong> that will be stored, processed, and<br />

transmitted through the <strong>Web</strong> server<br />

Identify security requirements of informati<strong>on</strong><br />

Identify how informati<strong>on</strong> is published to the <strong>Web</strong> server<br />

Identify the security requirements of other hosts involved (e.g., backend<br />

database or <strong>Web</strong> service)<br />

Identify a dedicated host to run the <strong>Web</strong> server<br />

Identify network services that will be provided or supported by the <strong>Web</strong><br />

server<br />

Identify the security requirements of any additi<strong>on</strong>al services provided or<br />

supported by the <strong>Web</strong> server<br />

Identify how the <strong>Web</strong> server will be managed<br />

Identify users and categories of users of the <strong>Web</strong> server and determine<br />

privilege for each category of user<br />

Identify user authenticati<strong>on</strong> methods for the <strong>Web</strong> server and how<br />

authenticati<strong>on</strong> data will be protected<br />

Identify how access to informati<strong>on</strong> resources will be enforced<br />

3-13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!