19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

the system by the manufacturer should be entirely removed, because errors<br />

have repeatedly appeared in these programs in the past.<br />

<strong>The</strong> directory in which the retrievable files are stored should be located on a<br />

separate partition of a hard disk so as to make it easier to restore it after a hard<br />

disk defect. Moreover, the subdirectories and files should belong to a specific<br />

user (for example wwwadmin) and be protected against unauthorised access by<br />

being given minimum access rights.<br />

During configuration of an HTTP server, a number of options should be taken<br />

into account which are relevant to security. <strong>The</strong>se include, for example:<br />

- Listing directory contents<br />

This option should be deactivated. If the complete contents of a directory<br />

are disclosed to the outside, it is often the case that too much information is<br />

divulged. This is dangerous in particular if the directory contains files<br />

whose existence is not supposed to be made known externally, i.e.<br />

password files, for example, or files that are not generally accessible. It is<br />

better to use index files in order to make the contents of directories known<br />

externally.<br />

- Use of symbolic links<br />

This option should be deactivated, because symbolic links can be used to<br />

gain access to files outside the approved Web directory. During the<br />

configuration of the server, the area which the server is allowed to access<br />

in order to disseminate files via HTTP is specified as the DocumentRoot.<br />

Files outside the DocumentRoot and the cgi-bin directory are not<br />

disseminated, even if the HTTP daemon possesses read rights.<br />

If it is necessary to make the same document accessible via various URLs,<br />

it is more advisable to use the route via a Redirect in the .htaccess file.<br />

- Anonymous use of the server<br />

Even if user-defined access protection is set up on a WWW server, it is<br />

often also desirable to grant access to new, as yet unknown users, i.e. to<br />

new customers, for example. Provision can be made for anonymous access<br />

for this purpose. To gain access, a user can either not log in at all or log in<br />

with his or her e-mail address as the password. If this is wrongly<br />

configured, however, the entire contents of the server may be freely<br />

available as a result. This option should therefore be used with particular<br />

caution.<br />

<strong>The</strong> following checklist is recommended:<br />

1. Are only necessary components installed? It is advisable to compile the<br />

http daemon yourself; in that way, unnecessary functions will not be<br />

compiled in the first place.<br />

2. Is the http daemon configured to be as restrictive as possible? Either cgi<br />

programs should be entirely disabled, therefore, or the cgi programs should<br />

be restricted to their own directory. File access by the http daemon should<br />

be limited to part of the directory tree. Separate, unprivileged user rights<br />

should be used for administration and operation of the server.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!