11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

452 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong> To audit failed actions across the file system1. Start Windows Explorer <strong>and</strong> navigate to the root of the file system.2. Right-click <strong>and</strong> then click Properties.3. Click the <strong>Security</strong> tab.4. Click Advanced <strong>and</strong> then click the Auditing tab.5. Click Add <strong>and</strong> then enter Everyone in the Name field.6. Click OK <strong>and</strong> then select all of the Failed check boxes to audit all failed events.By default, this applies to the current folder <strong>and</strong> all subfolders <strong>and</strong> files.7. Click OK three times to close all open dialog boxes.Failed audit events are logged to the Windows security event log.Relocate <strong>and</strong> Secure the IIS Log FilesBy moving <strong>and</strong> renaming the IIS log files, you make it much more difficult for anattacker to cover his tracks. The attacker must locate the log files before he or she canalter them. To make an attacker’s task more difficult still, use NTFS permissions tosecure the log files.Move <strong>and</strong> rename the IIS log file directory to a different volume than your <strong>Web</strong> site.Do not use the system volume. Then, apply the following NTFS permissions to thelog files folder <strong>and</strong> subfolders.● Administrators: Full Control● System: Full Control● Backup Operators: ReadArchive Log Files for Offline AnalysisTo facilitate the offline analysis of IIS log files, you can use a script to automate secureremoval of log files from an IIS server. Log files should be removed at least every 24hours. An automated script can use FTP, SMTP, HTTP, or SMB to transfer log filesfrom a server computer. However, if you enable one of these protocols, do so securelyso that you do not open any additional attack opportunities. Use an IPSec policy tosecure ports <strong>and</strong> channels.Audit Access to the Metabase.bin FileAudit all failures by the Everyone group to the IIS metabase.bin file located in\WINNT\System32\inetsrv\. Do the same for the \Metabase backup folder for thebackup copies of the metabase.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!