11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

446 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Step 6. Files <strong>and</strong> DirectoriesInstall Windows 2000 on partitions formatted with the NTFS file system so that youbenefit from NTFS permissions to restrict access. Use strong access controls to protectsensitive files <strong>and</strong> directories. In most situations, an approach that allows access tospecific accounts is more effective than one that denies access to specific accounts. Setaccess at the directory level whenever possible. As files are added to the folder theyinherit permissions from the folder, so you need to take no further action.During this step, you:● Restrict the Everyone group.●●●Restrict the anonymous <strong>Web</strong> account(s).Secure or remove tools, utilities, <strong>and</strong> SDKs.Remove sample files.Restrict the Everyone GroupThe default NTFS permissions for Windows 2000 grant members of the Everyonegroup full control access to a number of key locations, including the root directory,\inetpub, <strong>and</strong> \inetpub\scripts.First grant FULL CONTROL to the Administrator account to the root (\), thenremove access rights for the Everyone group from the following directories.● Root (\)●●●System directory (\WINNT\system32)Framework tools directory (\WINNT\Microsoft.NET\Framework\{version})<strong>Web</strong> site root directory <strong>and</strong> all content directories (the default is \inetpub\*)Restrict Access to the IIS Anonymous AccountThe anonymous account is well known. Attackers target this well known account toperform malicious actions. To secure the anonymous account:● Deny write access to <strong>Web</strong> content directories.Make sure that it is not possible for this account to write to content directories, forexample, to deface <strong>Web</strong> sites.● Restrict access to System tools.In particular, restrict access to comm<strong>and</strong>-line tools located in \WINNT\System32.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!