11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

428 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>●●●●●●ProtocolsAvoid using protocols that are inherently insecure. If you cannot avoid using theseprotocols, take the appropriate measures to provide secure authentication <strong>and</strong>communication, for example, by using IPSec policies. Examples of insecure, cleartext protocols are Telnet, Post Office Protocol (POP3), Simple Mail TransferProtocol (SMTP), <strong>and</strong> File Transfer Protocol (FTP).AccountsAccounts grant authenticated access to your computer, <strong>and</strong> these accounts must beaudited. What is the purpose of the user account? How much access does it have?Is it a common account that can be targeted for attack? Is it a service account thatcan be compromised <strong>and</strong> must therefore be contained? Configure accounts withleast privilege to help prevent elevation of privilege. Remove any accounts thatyou do not need. Slow down brute force <strong>and</strong> dictionary attacks with strongpassword policies, <strong>and</strong> then audit <strong>and</strong> alert for logon failures.Files <strong>and</strong> DirectoriesSecure all files <strong>and</strong> directories with restricted NTFS permissions that only allowaccess to necessary Windows services <strong>and</strong> user accounts. Use Windows auditingto allow you to detect when suspicious or unauthorized activity occurs.SharesRemove all unnecessary file shares including the default administration shares ifthey are not required. Secure any remaining shares with restricted NTFSpermissions. Although shares may not be directly exposed to the Internet, adefense strategy — with limited <strong>and</strong> secured shares — reduces risk if a server iscompromised.PortsServices that run on the server listen to specific ports so that they can respond toincoming requests. Audit the ports on your server regularly to ensure that aninsecure or unnecessary service is not active on your <strong>Web</strong> server. If you detect anactive port that was not opened by an administrator, this is a sure sign ofunauthorized access <strong>and</strong> a security compromise.RegistryMany security-related settings are stored in the registry <strong>and</strong> as a result, you mustsecure the registry. You can do this by applying restricted Windows ACLs <strong>and</strong> byblocking remote registry administration.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!