11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Checklist:Securing Your NetworkHow to Use This ChecklistThis checklist is a companion to Chapter 15, “Securing Your Network.” Use it to helpsecure your network, or as a quick evaluation snapshot of the correspondingchapters.This checklist should evolve as you discover steps that help implement your securenetwork.Router ConsiderationsCheck DescriptionLatest patches <strong>and</strong> updates are installed.You subscribed to router vendor’s security notification service.Known vulnerable ports are blocked.Ingress <strong>and</strong> egress filtering is enabled. Incoming <strong>and</strong> outgoing packets are confirmed ascoming from public or internal networks.ICMP traffic is screened from the internal network.Administration interfaces to the router are enumerated <strong>and</strong> secured.<strong>Web</strong>-facing administration is disabled.Directed broadcast traffic is not received or forwarded.Unused services are disabled (for example, TFTP).Strong passwords are used.Logging is enabled <strong>and</strong> audited for unusual traffic or patterns.Large ping packets are screened.Routing Information Protocol (RIP) packets, if used, are blocked at the outermost router.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!