11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 15: Securing Your Network 415●●Stateful inspection<strong>Application</strong> filters are limited to knowledge of the payload of a packet <strong>and</strong>therefore make filtering decisions based only on the payload. Stateful inspectionuses both the payload <strong>and</strong> its context to determine filtering rules. Using thepayload <strong>and</strong> the packet contents allow stateful inspection rules to ensure session<strong>and</strong> communication integrity. The inspection of packets, their payload, <strong>and</strong>sequence limits the scalability of stateful inspection.Custom application filtersThese filters ensure the integrity of application server/client communication.When you use filters at multiple levels of the network stack, it helps make yourenvironment more secure. For example, a packet filter can be used to block IP trafficdestined for any port other than port 80, <strong>and</strong> an application filter might furtherrestrict traffic based on the nature of the HTTP verb. For example, it might blockHTTP DELETE verbs.Logging <strong>and</strong> AuditingLogging all incoming <strong>and</strong> outgoing requests — regardless of firewall rules — allowsyou to detect intrusion attempts or, even worse, successful attacks that werepreviously undetected. Historically, network administrators sometimes had toanalyze audit logs to determine how an attack succeeded. In those cases,administrators were able to apply solutions to the vulnerabilities, learn how theywere compromised, <strong>and</strong> discover other vulnerabilities that existed.Apply the following policies for logging <strong>and</strong> log auditing.● Log all traffic that passes through the firewall.● Maintain healthy log cycling that allows quick data analysis. The more data youhave, the larger the log file size.● Make sure the firewall clock is synchronized with the other network hardware.Perimeter NetworksA firewall should exist anywhere your servers interact with an untrusted network. Ifyour <strong>Web</strong> servers connect to a back-end network, such as a bank of database serversor corporate network, a screen should exist to isolate the two networks. While the<strong>Web</strong> zone has the greatest degree of exposure, a compromise in the <strong>Web</strong> zone shouldnot result in the compromise of downstream networks.By default, the perimeter network should block all outbound connections exceptthose that are expected.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!