27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

identity theft. Successful attacks can compromise c<strong>on</strong>fidential <strong>Web</strong> site resources or harm an<br />

organizati<strong>on</strong>’s image. These indirect attacks occur in two forms:<br />

Phishing, where attackers use social engineering to trick users into logging into a fake site<br />

Pharming, where Domain Name System (DNS) servers or users’ host files are compromised to<br />

redirect users to a malicious site in place of the legitimate site.<br />

This document is intended to assist organizati<strong>on</strong>s in installing, c<strong>on</strong>figuring, and maintaining secure public<br />

<strong>Web</strong> servers. More specifically, this document describes, in detail, the following practices to apply:<br />

<strong>Securing</strong>, installing, and c<strong>on</strong>figuring the underlying operating system<br />

<strong>Securing</strong>, installing, and c<strong>on</strong>figuring <strong>Web</strong> server software<br />

Deploying appropriate network protecti<strong>on</strong> mechanisms, such as firewalls, routers, switches, and<br />

intrusi<strong>on</strong> detecti<strong>on</strong> and intrusi<strong>on</strong> preventi<strong>on</strong> systems<br />

Maintaining the secure c<strong>on</strong>figurati<strong>on</strong> through applicati<strong>on</strong> of appropriate patches and upgrades,<br />

security testing, m<strong>on</strong>itoring of logs, and backups of data and operating system files<br />

Using, publicizing, and protecting informati<strong>on</strong> and data in a careful and systematic manner.<br />

The following key guidelines are recommended to Federal departments and agencies for maintaining a<br />

secure <strong>Web</strong> presence.<br />

Organizati<strong>on</strong>s should carefully plan and address the security aspects of the deployment of a public<br />

<strong>Web</strong> server.<br />

Because it is much more difficult to address security <strong>on</strong>ce deployment and implementati<strong>on</strong> have occurred,<br />

security should be c<strong>on</strong>sidered from the initial planning stage. Organizati<strong>on</strong>s are more likely to make<br />

decisi<strong>on</strong>s about c<strong>on</strong>figuring computers appropriately and c<strong>on</strong>sistently when they develop and use a<br />

detailed, well-designed deployment plan. Developing such a plan will support <strong>Web</strong> server administrators<br />

in making the inevitable tradeoff decisi<strong>on</strong>s between usability, performance, and risk.<br />

Organizati<strong>on</strong>s often fail to c<strong>on</strong>sider the human resource requirements for both deployment and<br />

operati<strong>on</strong>al phases of the <strong>Web</strong> server and supporting infrastructure. Organizati<strong>on</strong>s should address the<br />

following points in a deployment plan:<br />

Types of pers<strong>on</strong>nel required (e.g., system and <strong>Web</strong> server administrators, <strong>Web</strong>masters, network<br />

administrators, informati<strong>on</strong> systems security officers [ISSO])<br />

Skills and training required by assigned pers<strong>on</strong>nel<br />

Individual (i.e., level of effort required of specific pers<strong>on</strong>nel types) and collective staffing (i.e.,<br />

overall level of effort) requirements.<br />

Organizati<strong>on</strong>s should implement appropriate security management practices and c<strong>on</strong>trols when<br />

maintaining and operating a secure <strong>Web</strong> server.<br />

Appropriate management practices are essential to operating and maintaining a secure <strong>Web</strong> server.<br />

Security practices entail the identificati<strong>on</strong> of an organizati<strong>on</strong>’s informati<strong>on</strong> system assets and the<br />

ES-2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!