27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Restore the system.<br />

• Either install a clean versi<strong>on</strong> of the OS, applicati<strong>on</strong>s, necessary patches, and <strong>Web</strong> c<strong>on</strong>tent; or<br />

restore the system from backups (this opti<strong>on</strong> can be more risky because the backups may have<br />

been made after the compromise, and restoring from a compromised backup may still allow the<br />

attacker access to the system).<br />

• Disable unnecessary services.<br />

• Apply all patches.<br />

• Change all passwords (including <strong>on</strong> uncompromised hosts, if their passwords are believed to have<br />

been seen by the compromised host, or if the same passwords are used <strong>on</strong> other hosts).<br />

• Rec<strong>on</strong>figure network security elements (e.g., firewall, router, IDPS) to provide additi<strong>on</strong>al<br />

protecti<strong>on</strong> and notificati<strong>on</strong>.<br />

Test system to ensure security.<br />

Rec<strong>on</strong>nect system to network.<br />

M<strong>on</strong>itor system and network for signs that the attacker is attempting to access the system or network<br />

again.<br />

Document less<strong>on</strong>s learned.<br />

Based <strong>on</strong> the organizati<strong>on</strong>’s policy and procedures, system administrators should decide whether to<br />

reinstall the OS of a compromised system or restore it from a backup. Factors that are often c<strong>on</strong>sidered<br />

include the following:<br />

Level of access that the attacker gained (e.g., root, user, guest, system)<br />

Type of attacker (internal or external)<br />

Purpose of compromise (e.g., <strong>Web</strong> page defacement, illegal software repository, platform for other<br />

attacks)<br />

Method used for the system compromise<br />

Acti<strong>on</strong>s of the attacker during and after the compromise (e.g., log files, intrusi<strong>on</strong> detecti<strong>on</strong> reports)<br />

Durati<strong>on</strong> of the compromise<br />

Extent of the compromise <strong>on</strong> the network (e.g., the number of hosts compromised)<br />

Results of c<strong>on</strong>sultati<strong>on</strong> with management and legal counsel.<br />

The lower the level of access gained by the intruder and the more the <strong>Web</strong> server administrator<br />

understands about the attacker’s acti<strong>on</strong>s, the less risk there is in restoring from a backup and patching the<br />

vulnerability. For incidents in which there is less known about the attacker’s acti<strong>on</strong>s and/or in which the<br />

attacker gains high-level access, it is recommended that the OS and applicati<strong>on</strong>s be reinstalled from the<br />

9-10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!