11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

654 Part V: Assessing Your <strong>Security</strong>Auditing <strong>and</strong> LoggingCheck that you have configured IIS auditing to help detect attacks in progress <strong>and</strong> todiagnose attack footprints. The following review questions help identifyvulnerabilities in IIS auditing:● Are log files located on a separate non-system volume?Right click your <strong>Web</strong> site in IIS <strong>and</strong> click the <strong>Web</strong> Site tab. Click the Propertiesbutton to check the log file location. Check that the log files are located in a nondefaultlocation using a non-default name, preferably on a non-system volume.● Do you restrict access to the log files?Use Windows Explorer to view the ACL on the log files directory. Check thatthe ACL grants Administrators <strong>and</strong> System full control but grants access to noother user.<strong>Web</strong> PermissionsReview the default <strong>Web</strong> permissions configured for your <strong>Web</strong> site <strong>and</strong> for eachvirtual directory. Check that the following conditions are met:● Include directories restrict Read permissions.● Virtual directories for which anonymous access is allowed are configured torestrict Write <strong>and</strong> Execute permissions.● Write permissions <strong>and</strong> script source access permissions are only granted to contentfolders that allow content authoring. Also check that folders that allow contentauthoring require authentication <strong>and</strong> Secure Sockets Layer (SSL) encryption.IP Address <strong>and</strong> Domain Name RestrictionsDo you use IP <strong>and</strong> domain name restrictions to restrict access to your <strong>Web</strong> server?If so, have you considered the risks of IP spoofing?AuthenticationCheck the authentication settings for your <strong>Web</strong> sites <strong>and</strong> virtual directories. Ensurethat anonymous access is only supported for publicly accessible areas of your site.If you are selecting multiple authentication options, thoroughly test the effects <strong>and</strong>authentication-precedence on your application.If Basic authentication is selected, check that SSL is used across the site to protectcredentials.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!