27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Completed<br />

Acti<strong>on</strong><br />

Provides guidelines <strong>on</strong> styles and formats appropriate for <strong>Web</strong> publishing<br />

Provides for appropriate review of the informati<strong>on</strong> for sensitivity and<br />

distributi<strong>on</strong>/release c<strong>on</strong>trols (including the sensitivity of the informati<strong>on</strong> in<br />

aggregate)<br />

Determines the appropriate access and security c<strong>on</strong>trols<br />

Provides guidance <strong>on</strong> the informati<strong>on</strong> c<strong>on</strong>tained within the source code of the<br />

<strong>Web</strong> c<strong>on</strong>tent<br />

Maintain <strong>Web</strong> user privacy<br />

Maintain a published privacy policy<br />

Prohibit the collecti<strong>on</strong> of pers<strong>on</strong>ally identifying data without the explicit<br />

permissi<strong>on</strong> of the user and collect <strong>on</strong>ly the data that is absolutely needed<br />

Prohibit the use of “persistent” cookies<br />

Use the sessi<strong>on</strong> cookie <strong>on</strong>ly if it is clearly identified in published privacy policy<br />

Mitigate indirect attacks <strong>on</strong> c<strong>on</strong>tent<br />

Ensure users of the site are aware of the dangers of phishing and pharming<br />

attacks and how to avoid them<br />

Validate official communicati<strong>on</strong> by pers<strong>on</strong>alizing emails and providing unique<br />

identifying (but not c<strong>on</strong>fidential) informati<strong>on</strong> <strong>on</strong>ly the organizati<strong>on</strong> and user<br />

should know<br />

Use digital signatures <strong>on</strong> e-mail if appropriate<br />

Perform c<strong>on</strong>tent validati<strong>on</strong> within the <strong>Web</strong> applicati<strong>on</strong> to prevent more<br />

sophisticated phishing attacks (e.g., cross-site scripting based attacks)<br />

Pers<strong>on</strong>alize <strong>Web</strong> c<strong>on</strong>tent to aid in users’ identifying fraudulent <strong>Web</strong> sites<br />

Use token-based or mutual authenticati<strong>on</strong> if applicable<br />

Suggest the use of <strong>Web</strong> browsers or browser toolbars with phishing/<br />

pharming protecti<strong>on</strong><br />

Use current versi<strong>on</strong>s of DNS software with the latest security patches<br />

Install server-side DNS protecti<strong>on</strong> mechanisms<br />

M<strong>on</strong>itor organizati<strong>on</strong>al domains and similar domains<br />

Simplify the structure of organizati<strong>on</strong> domain names<br />

Use secure c<strong>on</strong>necti<strong>on</strong>s for logins<br />

If necessary, engage a vendor to provide str<strong>on</strong>ger anti-phishing/<br />

anti-pharming measures<br />

Client-side active c<strong>on</strong>tent security c<strong>on</strong>siderati<strong>on</strong>s<br />

Weigh the risks and benefits of client-side active c<strong>on</strong>tent<br />

Take no acti<strong>on</strong>s without the express permissi<strong>on</strong> of user<br />

When possible, <strong>on</strong>ly use widely-adopted active c<strong>on</strong>tent such as JavaScript,<br />

PDF, and Flash<br />

When possible, provide alternatives (e.g., HTML provided al<strong>on</strong>g with PDF)<br />

Maintain server-side active c<strong>on</strong>tent security<br />

Only simple, easy-to-understand code should be used<br />

Limited or no reading or writing to the file system should be permitted<br />

Limited or no interacti<strong>on</strong> with other programs (e.g., sendmail) should be<br />

permitted<br />

There should be no requirement to run with suid privileges <strong>on</strong> Unix or Linux<br />

Explicit path names should be used (i.e., does not rely <strong>on</strong> path variable)<br />

6-19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!