19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.69 <strong>Protection</strong> against active content<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Until recently, firewalls were considered to provide absolute protection<br />

against attacks on one's own network from the Internet. <strong>The</strong>y ensured that no<br />

connection could be set up into the internal network from the Internet, and that<br />

internal users could access information on the Internet without difficulty. On<br />

account of the ever more widespread distribution of active content on WWW<br />

pages, however, this situation has changed. <strong>Information</strong> from the Internet is no<br />

longer simply viewed, but instead in some cases external program code is also<br />

executed during viewing. At present this means Java, ActiveX and JavaScript;<br />

others could be added to this list in future. <strong>The</strong>re are also elements known as<br />

plug-ins which enable other programs to be started from the browser; in some<br />

cases this is even done automatically from an HTML page. Depending on the<br />

type of program involved, executing it may be associated with a certain<br />

security risk.<br />

From today's standpoint there are several conceivable approaches to protecting<br />

an internal network against misuse by active content from the Internet. <strong>The</strong>se<br />

are explained in the following using the examples of Java, ActiveX and<br />

JavaScript.<br />

Prohibition of active content on the firewall<br />

Even today it is still possible to have very good access to the Internet without<br />

really needing active content. This is the safest and therefore recommended<br />

method of accessing the Internet, because in that way the firewall can continue<br />

to exercise principal control. In order to prevent the acceptance of active<br />

content, it is necessary to have a proxy on the application gateway, which<br />

examines HTML pages for active content. If the proxy finds any such content,<br />

it must be filtered out of the page. <strong>The</strong>re are a number of application gateways<br />

that offer this functionality (see S 2.75 Selection of a suitable application<br />

gateway).<br />

It must be assumed, however, that this solution, although it is the safest, will<br />

be less and less acceptable in the future, because the number of pages where<br />

the active content contains the actual information is on the increase. If the<br />

active content is filtered out, the internal user will no longer be able to access<br />

the information.<br />

Note: Active content may also be hidden in e-mails; these should therefore<br />

also be examined for such content. As encrypted communications cannot be<br />

checked for active content, SSL-based WWW access must not be allowed if<br />

there is central filtering.<br />

Prohibition of active content in the WWW browser<br />

In a network with centrally administered workstations, it is conceivable to<br />

restrict the rights of the individual users to the extent that they are no longer<br />

able to change the security settings of their WWW browsers. <strong>The</strong>se can then<br />

be configured in such a way that active content will not be executed. It is thus<br />

also possible to dispense with the filtering of active content on the application<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!