19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

3. Have all superfluous cgi programs and WWW pages been deleted?<br />

4. Is the HTTP port (usually port 80) the only accessible port on the computer<br />

(see S 4.97 One service per server)?<br />

5. Is appropriate regular backing up of the stored data ensured (see Chapter<br />

3.4 Data backup policy)?<br />

6. If cgi programs are used, are these programmed sufficiently securely? It is<br />

not permitted to accept any input values unchecked. It must be ensured that<br />

buffer overflows and race conditions are ruled out. <strong>The</strong> taint check should<br />

be activated in all Perl scripts.<br />

7. Is there a functioning routine for a regular integrity check (e.g. Tripwire;<br />

see S 4.93 Regular integrity checking)?<br />

Example: Setting up a simple WWW server<br />

On a WWW server of this type the contents of individual pages change only<br />

rarely; no cgi programs are used and there is no particular access protection.<br />

<strong>The</strong> individual WWW documents are loaded onto the WWW server via a data<br />

medium. On a server like this, all system files and also all HTML pages can<br />

be given write protection. Although an attacker is able to modify temporary<br />

files and log entries in a setup of this kind, he cannot make any changes to the<br />

system itself. Access protection in this form should be implemented by a<br />

physically write-protected medium, for example one or more CD-ROMs or a<br />

write-protected removable hard disk. At the very least, however, regular<br />

integrity checks should be performed (see S 4.93).<br />

Functionalities in the http daemon that are not required should be deactivated,<br />

i.e. those such as the possibility of executing cgi scripts. Whatever the case,<br />

cgi programs supplied with the system should be removed.<br />

In one frequently encountered variant of a simple Web server, the documents<br />

can be modified interactively on the WWW server with corresponding<br />

authorisations. In this case, protection against unauthorised changes and a<br />

regular integrity check at short intervals are especially important.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!