11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 15: Securing Your Network 419Table 15.3 Snapshot of a Secure Network (continued)ComponentCharacteristicLogging <strong>and</strong> auditing All permitted traffic is logged.Denied traffic is logged.Logs are cycled with a frequency that allows quick data analysis.All devices on the network are synchronized to a common time source.Perimeter networksPerimeter network is in place if multiple networks require access toservers.Firewall is placed between untrusted networks.SwitchPatches <strong>and</strong> updatesVLANsInsecure defaultsLatest security patches are tested <strong>and</strong> installed or the threat from knownvulnerabilities is mitigated.Make sure VLANs are not overused or overly trusted.All factory passwords are changed.Minimal administrative interfaces are available.Access controls are configured to secure SNMP community strings.ServicesEncryptionUnused services are disabled.Switched traffic is encrypted.OtherLog synchronizationAdministrative access tothe networkNetwork ACLsAll clocks on devices with logging capabilities are synchronized.TACACS or RADIUS is used to authenticate administrative users.The network is structured so ACLs can be placed on hosts <strong>and</strong> networks.SummaryNetwork security involves protecting network devices <strong>and</strong> the data that they forwardto provide additional security for host servers. The primary network components thatrequire secure configuration are the router, firewall, <strong>and</strong> switch.This chapter has highlighted the top threats to your network infrastructure <strong>and</strong> haspresented security recommendations <strong>and</strong> secure configurations that enable you toaddress these threats.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!