11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

648 Part V: Assessing Your <strong>Security</strong>●●●Do you use strong password policies?Use the Local <strong>Security</strong> Policy tool to review password policy. For informationabout the recommended password policy, see “Step 5. Accounts” in Chapter 16,“Securing Your <strong>Web</strong> Server.”Do you restrict remote logons?Check the user rights assignments within the Local <strong>Security</strong> Policy tool to ensurethat the Everyone group is not granted the “Access this computer from thenetwork” user right.Have you disabled null sessions?Check that null sessions are disabled to prevent anonymous (unauthenticated)sessions from being created with your server. To check this, run Regedt32.exe <strong>and</strong>confirm that the RestrictAnonymous key is set to 1 as shown below.HKLM\System\CurrentControlSet\Control\LSA\RestrictAnonymous=1Files <strong>and</strong> DirectoriesThe following review questions enable you to verify that you have used NTFSpermissions appropriately to lock down accounts such as the anonymous <strong>Web</strong> useraccount.● Is IIS installed on an NTFS volume?This allows you to use NTFS to configure ACLs on resources to restrict access.Do not build a server that uses FAT partitions.● Have you restricted the Everyone group?Use Windows Explorer to ensure that the Everyone group does not have accessto the following directories:● Root (:\)● System directory (\WINNT\system32)● Framework tools directory (\WINNT\Microsoft.NET\Framework\{version})●●<strong>Web</strong> site root directory <strong>and</strong> all content directories (default is \inetpub\*)Have you restricted the anonymous <strong>Web</strong> user account?Make sure that the anonymous Internet user account does not have the ability towrite to <strong>Web</strong> content directories. Use Windows Explorer to view the ACL on eachcontent directory. Also check the ACL on the %windir%\system32 directory tomake sure that it cannot access system tools <strong>and</strong> utilities.Note If you ran IISLockdown, the <strong>Web</strong> Anonymous Users group <strong>and</strong> the <strong>Web</strong> <strong>Application</strong>s groupcan be used to restrict access. By default, the <strong>Web</strong> Anonymous Users group contains the IUSRaccount <strong>and</strong> the <strong>Web</strong> <strong>Application</strong>s group contains Internet <strong>Web</strong> <strong>Application</strong> Manager (IWAM). Froman administrative perspective, restricting access to a group is preferred to individual accountrestriction.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!