11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 15: Securing Your Network 409FirewallThe role of the firewall is to block all unnecessary ports <strong>and</strong> to allow traffic only fromknown ports. The firewall must be capable of monitoring incoming requests toprevent known attacks from reaching the <strong>Web</strong> server. Coupled with intrusiondetection, the firewall is a useful tool for preventing attacks <strong>and</strong> detecting intrusionattempts, or in worst-case scenarios, the source of an attack.Like the router, the firewall runs on an operating system that must be patchedregularly. Its administration interfaces must be secured <strong>and</strong> unused services must bedisabled or removed.SwitchThe switch has a minimal role in a secure network environment. Switches aredesigned to improve network performance to ease administration. For this reason,you can easily configure a switch by sending specially formatted packets to it. Formore information, see “Switch Considerations” later in this chapter.Router ConsiderationsThe router is the very first line of defense. It provides packet routing, <strong>and</strong> it can alsobe configured to block or filter the forwarding of packet types that are known to bevulnerable or used maliciously, such as ICMP or Simple Network ManagementProtocol (SNMP).If you don’t have control of the router, there is little you can do to protect yournetwork beyond asking your ISP what defense mechanisms they have in place ontheir routers.The configuration categories for the router are:● Patches <strong>and</strong> updates● Protocols● Administrative access● Services● Auditing <strong>and</strong> logging● Intrusion detectionPatches <strong>and</strong> UpdatesSubscribe to alert services provided by the manufacturer of your networkinghardware so that you can stay current with both security issues <strong>and</strong> service patches.As vulnerabilities are found — <strong>and</strong> they inevitably will be found — good vendorsmake patches available quickly <strong>and</strong> announce these updates through e-mail or ontheir <strong>Web</strong> sites. Always test the updates before implementing them in a productionenvironment.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!