11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 22: Deployment Review 679●●●●●Do you use strong password policies?You should use strong password policies to mitigate the risks posed by brute force<strong>and</strong> dictionary attacks.Do you use static routing?By using static routes, an administrative interface must first be compromisedto make routing changes.Do you audit <strong>Web</strong> facing administrative interfaces?When possible, shut down the external administration interface <strong>and</strong> use internalaccess methods with ACLs.Do you use the logging features of your router?Check that your routers log all deny actions.Do you use an Intrusion Detection System?Intrusion Detection Systems (IDSs) can show where the perpetrator is attemptingattacks.FirewallUse the following questions to review your router configuration:● Have you applied the latest patches <strong>and</strong> updates?Check with the networking hardware manufacturer to ensure you have the latestpatches.● Do you log all traffic that flows though the firewall?● How often do you cycle logs?Ensure that you maintain healthy log cycling that allows quick data analysis.●Is the firewall clock synchronized with the other network hardware?SwitchUse the following questions to review your router configuration:●●●Have you applied the latest patches <strong>and</strong> updates?Check with the networking hardware manufacturer to ensure that you have thelatest patches.Have you disabled factory default settings?To make sure that insecure defaults are secured, check that you have changed allfactory default passwords <strong>and</strong> Simple Network Management Protocol (SNMP)community strings to prevent network enumeration or total control of the switch.Have you disabled unused services?Make sure that all unused services are disabled. Also, make sure that Trivial FileTransfer Protocol (TFTP) is disabled, Internet-facing administration points areremoved, <strong>and</strong> ACLs are configured to limit administrative access.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!