11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Securing Your <strong>Web</strong> Server 447●Assign permissions to groups instead of individual accounts.Assigning users to groups <strong>and</strong> applying permissions to groups instead ofindividual accounts is good practice. For the anonymous account, create a group<strong>and</strong> add the anonymous account to it <strong>and</strong> then explicitly deny access to the groupfor key directories <strong>and</strong> files. Assigning permissions to a group allows you to moreeasily change the anonymous account or create additional anonymous accountsbecause you do not need to recreate the permissions.Note IISLockdown denies write access to content directories for the anonymous account byapplying a deny write access control entry (ACE) for the <strong>Web</strong> Anonymous Users <strong>and</strong> <strong>Web</strong><strong>Application</strong>s groups. It also adds a deny execute ACL on comm<strong>and</strong>-line tools.●Use separate accounts for separate applications.If your <strong>Web</strong> server hosts multiple applications, use a separate anonymous accountfor each application. Add the accounts to an anonymous <strong>Web</strong> users group, forexample, the <strong>Web</strong> Anonymous Users group created by IISLockdown, <strong>and</strong> thenconfigure NTFS permissions using this group.For more information about using multiple anonymous accounts <strong>and</strong> hostingmultiple applications, see Chapter 20, “Hosting Multiple ASP.NET <strong>Application</strong>s.”Secure or Remove Tools, Utilities <strong>and</strong> SDKsSDKs <strong>and</strong> resource kits should not be installed on a production <strong>Web</strong> server. Removethem if they are present.● Ensure that only the .NET Framework Redistributable package is installed on theserver <strong>and</strong> no SDK utilities are installed. Do not install Visual Studio .NET onproduction servers.● Ensure that access to powerful system tools <strong>and</strong> utilities, such as those containedin the \Program Files directory, is restricted. IISLockdown does this for you.● Debugging tools should not be available on the <strong>Web</strong> server. If productiondebugging is necessary, then you should create a CD that contains the necessarydebugging tools.Remove Sample FilesSample applications are typically not configured with high degrees of security. It ispossible that an attacker could exploit an inherent weakness in a sample applicationor in its configuration to attack your <strong>Web</strong> site. Remove sample applications to reducethe areas where your <strong>Web</strong> server can be attacked.Additional ConsiderationsAlso consider removing unnecessary Data Source Names (DSNs). These contain cleartext connection details used by applications to connect to OLE DB data sources. Onlythose DSNs required by <strong>Web</strong> applications should be installed on the <strong>Web</strong> server.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!