19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems WWW server<br />

_________________________________________________________________________________________<br />

Recommended measures<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules"), as described in chapters 2.3 and 2.4, is recommended.<br />

In this chapter, only the threats and safeguards specific to a WWW server are described. In addition,<br />

chapter 6.1 Server-supported Network must be implemented to ensure the security of the<br />

organisation's own network.<br />

In order to ensure that the connection of the WWW server to public networks (such as the Internet) is<br />

secure, attention should be paid to chapter 7.3 Firewall. This is also the case for the connection of<br />

several Intranets to an extensive Intranet. <strong>The</strong> controlled connection of external connection points (e.g.<br />

of telecommuting workstations via ISDN) is dealt with in chapter 9.3 Telecommuting.<br />

A WWW server should be installed in a separate server room. <strong>The</strong> appropriate safeguards are<br />

described in Chapter 4.3.2. If no server room is available, the WWW server can alternatively be set up<br />

in a server cabinet (see chapter 4.4 Protective Cabinets).<br />

In order to set up a WWW server successfully and securely, a number of safeguards must be<br />

implemented. <strong>The</strong> steps and measures involved are described below:<br />

1. Creating a concept for the WWW server (see S 2.172 Developing a concept for using the WWW)<br />

and determining a WWW security strategy (see S 2.173 Determining a WWW security strategy):<br />

- Determining the security objectives<br />

- Adapting the network structure<br />

- Basic requirements<br />

- Organisational regulations<br />

2. Implementing the WWW server (see S 2.175 Setting up a WWW server):<br />

- Implementing the <strong>IT</strong> baseline protection safeguards for the WWW computer (for example,<br />

see chapter 6.2 for WWW servers based on Unix)<br />

- Using secure communication connections (see S 5.65 Use of S-HTTP and S 5.66 Use of SSL)<br />

- Java, ActiveX (see S 5.69 <strong>Protection</strong> against active content)<br />

3. Operating the WWW server (see S 2.174 Secure operation of a WWW server):<br />

- Regular checks<br />

- Adaptation to changes and tests<br />

- Access protection for WWW files (S 4.94 <strong>Protection</strong> of WWW files)<br />

- Logging at the WWW server<br />

- Contingency planning for the WWW server (see also Chapter 3.3)<br />

- Data backup (see chapter 3.4 Data backup policy)<br />

6. Secure operation of WWW clients<br />

Alongside the safeguards described in chapter 5 additional safeguards outlined in S 5.45 Security of<br />

WWW-browsers should be observed<br />

- Using secure communication connections (see S 5.65 Use of S-HTTP and S 5.66 Use of SSL)<br />

- <strong>Protection</strong> against viruses, macro viruses, active contents (see S 4.33 Running a virus scan<br />

program before and after data transfer and S 5.69 <strong>Protection</strong> against active content)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!