27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Completed<br />

Acti<strong>on</strong><br />

Protect against brute force attacks<br />

Use str<strong>on</strong>g authenticati<strong>on</strong> if possible<br />

Use a delay after failed login attempts<br />

Lock out an account after a set number of failed login attempts<br />

Enforce a password policy<br />

Blacklist IP addresses or domains known to attempt brute force attacks<br />

Use log m<strong>on</strong>itoring software to detect brute force attacks<br />

Implementing a Secure Network Infrastructure<br />

Completed<br />

Identify network locati<strong>on</strong><br />

Acti<strong>on</strong><br />

<strong>Web</strong> server is located in a DMZ, or <strong>Web</strong> server hosting is outsourced<br />

Assess firewall c<strong>on</strong>figurati<strong>on</strong><br />

<strong>Web</strong> server is protected by a firewall; if it faces a higher threat or is more vulnerable, it<br />

is protected by an applicati<strong>on</strong> layer firewall<br />

Firewall c<strong>on</strong>trols all traffic between the Internet and the <strong>Web</strong> server<br />

Firewall blocks all inbound traffic to the <strong>Web</strong> server except TCP ports 80 (HTTP)<br />

and/or <str<strong>on</strong>g>44</str<strong>on</strong>g>3 (HTTPS), if required<br />

Firewall blocks (in c<strong>on</strong>juncti<strong>on</strong> with the IDPS) IP addresses or subnets that the IDPS<br />

reports are attacking the organizati<strong>on</strong>al network<br />

Firewall notifies the network or <strong>Web</strong> server administrator of suspicious activity through<br />

an appropriate means<br />

Firewall provides c<strong>on</strong>tent filtering (applicati<strong>on</strong> layer firewall)<br />

Firewall is c<strong>on</strong>figured to protect against DoS attacks<br />

Firewall detects malformed or known attack URL requests<br />

Firewall logs critical events<br />

Firewall and firewall OS are patched to latest or most secure level<br />

Evaluate intrusi<strong>on</strong> detecti<strong>on</strong> and preventi<strong>on</strong> systems<br />

Host-based IDPS is used for <strong>Web</strong> servers that operate primarily using SSL/TLS<br />

IDPS is c<strong>on</strong>figured to m<strong>on</strong>itor network traffic to and from the <strong>Web</strong> server after firewall<br />

IDPS is c<strong>on</strong>figured to m<strong>on</strong>itor changes to critical files <strong>on</strong> <strong>Web</strong> server (host-based IDPS<br />

or file integrity checker)<br />

IDPS blocks (in c<strong>on</strong>juncti<strong>on</strong> with the firewall) IP addresses or subnets that are<br />

attacking the organizati<strong>on</strong>al network<br />

IDPS notifies the IDPS administrators or <strong>Web</strong> server administrator of attacks through<br />

appropriate means<br />

IDPS is c<strong>on</strong>figured to maximize detecti<strong>on</strong> with an acceptable level of false positives<br />

IDPS is c<strong>on</strong>figured to log events<br />

IDPS is updated with new attack signatures frequently (e.g., <strong>on</strong> a daily basis)<br />

Host-based IDPS is c<strong>on</strong>figured to m<strong>on</strong>itor the system resources available in the <strong>Web</strong><br />

server host<br />

Assess network switches<br />

Switches are used to protect against network eavesdropping<br />

E-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!