27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Schedules of organizati<strong>on</strong>al principals or their exact locati<strong>on</strong> (whether <strong>on</strong> or off the premises)<br />

Informati<strong>on</strong> <strong>on</strong> the compositi<strong>on</strong> or preparati<strong>on</strong> of hazardous materials or toxins 32<br />

Sensitive informati<strong>on</strong> relating to homeland security<br />

Investigative records<br />

Financial records (bey<strong>on</strong>d those already publicly available)<br />

Medical records<br />

The organizati<strong>on</strong>’s physical and informati<strong>on</strong> security procedures<br />

Informati<strong>on</strong> about organizati<strong>on</strong>’s network and informati<strong>on</strong> system infrastructure (e.g., address ranges,<br />

naming c<strong>on</strong>venti<strong>on</strong>s, access numbers)<br />

Informati<strong>on</strong> that specifies or implies physical security vulnerabilities<br />

Plans, maps, diagrams, aerial photographs, and architectural plans of organizati<strong>on</strong>al building,<br />

properties, or installati<strong>on</strong>s<br />

Informati<strong>on</strong> <strong>on</strong> disaster recovery or c<strong>on</strong>tinuity of operati<strong>on</strong>s plans except as absolutely required<br />

Details <strong>on</strong> emergency resp<strong>on</strong>se procedures, evacuati<strong>on</strong> routes, or organizati<strong>on</strong>al pers<strong>on</strong>nel resp<strong>on</strong>sible<br />

for these issues<br />

Copyrighted material without the written permissi<strong>on</strong> of the owner<br />

Privacy or security policies that indicate the types of security measures in place to the degree that they<br />

may be useful to an attacker.<br />

Organizati<strong>on</strong>s should not use public <strong>Web</strong> servers to host sensitive informati<strong>on</strong> intended to be accessed<br />

<strong>on</strong>ly by internal users. The compromise of a public <strong>Web</strong> server often leads to the compromise of such<br />

data.<br />

To ensure a c<strong>on</strong>sistent approach, an organizati<strong>on</strong> should create a formal policy and process for<br />

determining and approving the informati<strong>on</strong> to be published <strong>on</strong> a <strong>Web</strong> server. In many organizati<strong>on</strong>s, this<br />

is the resp<strong>on</strong>sibility of the CIO and/or public affairs officer. Such a process should include the following<br />

steps:<br />

Identify informati<strong>on</strong> that should be published <strong>on</strong> the <strong>Web</strong><br />

Identify the target audience (Why publish if no audience exists?)<br />

Identify possible negative ramificati<strong>on</strong>s of publishing the informati<strong>on</strong><br />

32<br />

email addresses are much more likely to receive spam. Two, pers<strong>on</strong>ally identifying email addresses can provide useful<br />

informati<strong>on</strong> to an attacker (e.g., possible usernames, informati<strong>on</strong> for social engineering attempts).<br />

For more guidance <strong>on</strong> protecting this type of informati<strong>on</strong>, see the White House Memorandum dated March 19, 2000, Acti<strong>on</strong><br />

to Safeguard Informati<strong>on</strong> Regarding Weap<strong>on</strong>s of Mass Destructi<strong>on</strong> and Other Sensitive Documents Related to Homeland<br />

Security (http://www.usdoj.gov/oip/foiapost/2002foiapost10.htm).<br />

6-2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!