19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.94 <strong>Protection</strong> of WWW files<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

<strong>The</strong> files and directories on a WWW server must be protected against<br />

unauthorised changes, but also - depending on the security requirements -<br />

against unauthorised access.<br />

General aspects<br />

If scripts are attached via cgi-bin, it is essential to ensure that programming is<br />

secure in order to prevent the scripts from being used to circumvent the<br />

server's protection mechanisms. One possible means of making unauthorised<br />

access more difficult is to run the scripts under a user ID which only has<br />

access to selected files. It is particularly important to protect the configuration<br />

files, because otherwise it is easy to deactivate all access restrictions.<br />

<strong>The</strong> read rights and write rights for the WWW files should allow only<br />

authorised users access, as local files.<br />

<strong>Protection</strong> against unauthorised changes<br />

On a typical WWW server, only the log files are subject to constant change;<br />

all other files are static. This applies in particular to system programs and the<br />

WWW pages. Although WWW pages are regularly updated, they should not<br />

be edited on the WWW server itself.<br />

In order to ensure that no files can be modified on the WWW server without<br />

this being noticed, checksums should be formed for all static files and<br />

directories (for example with a program such as tripwire; see also S 4.93<br />

Regular integrity checking) and should be checked at regular intervals.<br />

In order to prevent the possibility of WWW files being modified by<br />

unauthorised third parties at all, static data can be stored on a write-protected<br />

storage medium (such as a CD-ROM or a hard disk with write protection).<br />

<strong>Protection</strong> against unauthorised access<br />

Access to files or directories on a WWW server can be protected in various<br />

ways:<br />

- Access can be restricted to freely selectable IP addresses, subnetworks or<br />

domains.<br />

- User-specific IDs and passwords can be assigned.<br />

- <strong>The</strong> files can be stored in encrypted form and the associated cryptographic<br />

keys only made known to the target audience.<br />

Authentication by means of addresses<br />

Authentication by means of numerical IP addresses does not offer the<br />

protection of cryptographic procedures because it can be rendered ineffective<br />

by an attack based on IP spoofing. IP spoofing involves an attacker falsifying<br />

IP packets in order to pretend that they originate from a trustworthy <strong>IT</strong> system<br />

(see T 5.48 IP spoofing). However, a firewall can be used to prevent external<br />

users from pretending to be internal users. If access is not restricted to<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!