27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

services. Some comm<strong>on</strong> types of services and applicati<strong>on</strong>s that should usually be disabled if not required<br />

include the following:<br />

File and printer sharing services (e.g., Windows Network Basic Input/Output System [NetBIOS] file<br />

and printer sharing, Network File System [NFS], File Transfer Protocol [FTP])<br />

Wireless networking services<br />

Remote c<strong>on</strong>trol and remote access programs, particularly those that do not str<strong>on</strong>gly encrypt their<br />

communicati<strong>on</strong>s (e.g., Telnet) 20<br />

Directory services (e.g., Lightweight Directory Access Protocol [LDAP], Kerberos, Network<br />

Informati<strong>on</strong> System [NIS])<br />

Email services (e.g., Simple Mail Transfer Protocol [SMTP])<br />

Language compilers and libraries<br />

System development tools<br />

System and network management tools and utilities, including Simple Network Management Protocol<br />

(SNMP).<br />

Removing unnecessary services and applicati<strong>on</strong>s is preferable to simply disabling them through<br />

c<strong>on</strong>figurati<strong>on</strong> settings because attacks that attempt to alter settings and activate a disabled service cannot<br />

succeed when the functi<strong>on</strong>al comp<strong>on</strong>ents are completely removed. Disabled services could also be<br />

enabled inadvertently through human error.<br />

Eliminating or disabling unnecessary services enhances the security of a <strong>Web</strong> server in several ways<br />

[Alle00]:<br />

Other services cannot be compromised and used to attack the host or impair the services of the <strong>Web</strong><br />

server. Each service added to a host increases the risk of compromise for that host because each<br />

service is another possible avenue of access for an attacker. Less is more secure in this case.<br />

Other services may have defects or may be incompatible with the <strong>Web</strong> server itself. By disabling or<br />

removing them, they should not affect the <strong>Web</strong> server and should potentially improve its availability.<br />

The host can be c<strong>on</strong>figured to better suit the requirements of the particular service. Different services<br />

might require different hardware and software c<strong>on</strong>figurati<strong>on</strong>s, which could lead to unnecessary<br />

vulnerabilities or negatively affect performance.<br />

By reducing services, the number of logs and log entries is reduced; therefore, detecting unexpected<br />

behavior becomes easier (see Secti<strong>on</strong> 9).<br />

Organizati<strong>on</strong>s should determine the services to be enabled <strong>on</strong> a <strong>Web</strong> server. Services in additi<strong>on</strong> to the<br />

<strong>Web</strong> server service that might be installed include database access protocols, file transfer protocols, and<br />

20<br />

If a remote c<strong>on</strong>trol or remote access program is absolutely required and it does not str<strong>on</strong>gly encrypt its communicati<strong>on</strong>s, it<br />

should be tunneled over a protocol that provides encrypti<strong>on</strong>, such as secure shell (SSH) or IP Security (IPsec). Secti<strong>on</strong> 7<br />

provides additi<strong>on</strong>al informati<strong>on</strong> <strong>on</strong> requirements for cryptography.<br />

4-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!