27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

6. <strong>Securing</strong> <strong>Web</strong> C<strong>on</strong>tent.....................................................................................................6-1<br />

6.1 Publishing Informati<strong>on</strong> <strong>on</strong> <strong>Public</strong> <strong>Web</strong> Sites ............................................................6-1<br />

6.2 Observing Regulati<strong>on</strong>s about the Collecti<strong>on</strong> of Pers<strong>on</strong>al Informati<strong>on</strong>......................6-3<br />

6.3 Mitigating Indirect Attacks <strong>on</strong> C<strong>on</strong>tent .....................................................................6-5<br />

6.3.1 Phishing........................................................................................................6-5<br />

6.3.2 Pharming ......................................................................................................6-7<br />

6.4 <strong>Securing</strong> Active C<strong>on</strong>tent and C<strong>on</strong>tent Generati<strong>on</strong> Technologies.............................6-8<br />

6.4.1 Vulnerabilities with Client-Side Active C<strong>on</strong>tent Technologies ....................6-10<br />

6.4.2 Vulnerabilities with Server-Side C<strong>on</strong>tent Generati<strong>on</strong> Technologies ...........6-12<br />

6.4.3 Server-Side C<strong>on</strong>tent Generator Security C<strong>on</strong>siderati<strong>on</strong>s...........................6-15<br />

6.4.4 Locati<strong>on</strong> of Server-Side C<strong>on</strong>tent Generators .............................................6-17<br />

6.4.5 Cross-Site Scripting Vulnerabilities ............................................................6-17<br />

6.5 Checklist for <strong>Securing</strong> <strong>Web</strong> C<strong>on</strong>tent ......................................................................6-18<br />

7. Using Authenticati<strong>on</strong> and Encrypti<strong>on</strong> Technologies....................................................7-1<br />

7.1 Determining Authenticati<strong>on</strong> and Encrypti<strong>on</strong> Requirements .....................................7-1<br />

7.2 Address-Based Authenticati<strong>on</strong>.................................................................................7-1<br />

7.3 Basic Authenticati<strong>on</strong> ................................................................................................7-2<br />

7.4 Digest Authenticati<strong>on</strong> ...............................................................................................7-2<br />

7.5 SSL/TLS...................................................................................................................7-3<br />

7.5.1 SSL/TLS Capabilities....................................................................................7-3<br />

7.5.2 Weaknesses of SSL/TLS..............................................................................7-4<br />

7.5.3 Example SSL/TLS Sessi<strong>on</strong> ..........................................................................7-5<br />

7.5.4 SSL/TLS Encrypti<strong>on</strong> Schemes .....................................................................7-6<br />

7.5.5 Implementing SSL/TLS.................................................................................7-8<br />

7.5.6 SSL/TLS Implementati<strong>on</strong>s..........................................................................7-12<br />

7.6 Brute Force Attacks ...............................................................................................7-12<br />

7.7 Checklist for Using Authenticati<strong>on</strong> and Encrypti<strong>on</strong> Technologies for <strong>Web</strong> <strong>Servers</strong>7-14<br />

8. Implementing a Secure Network Infrastructure ............................................................8-1<br />

8.1 Network Compositi<strong>on</strong> and Structure ........................................................................8-1<br />

8.1.1 Inadvisable Network Layout .........................................................................8-1<br />

8.1.2 Demilitarized Z<strong>on</strong>e........................................................................................8-1<br />

8.1.3 Outsourced Hosting......................................................................................8-4<br />

8.1.4 Management Network ..................................................................................8-5<br />

8.2 Network Element C<strong>on</strong>figurati<strong>on</strong> ...............................................................................8-5<br />

8.2.1 Router/Firewall C<strong>on</strong>figurati<strong>on</strong> .......................................................................8-5<br />

8.2.2 Intrusi<strong>on</strong> Detecti<strong>on</strong> and Preventi<strong>on</strong> Systems................................................8-9<br />

8.2.3 Network Switches .......................................................................................8-11<br />

8.2.4 Load Balancers...........................................................................................8-12<br />

8.2.5 Reverse Proxies .........................................................................................8-12<br />

8.3 Checklist for Implementing a Secure Network Infrastructure.................................8-13<br />

9. Administering the <strong>Web</strong> Server........................................................................................9-1<br />

9.1 Logging ....................................................................................................................9-1<br />

9.1.1 Identifying the Logging Capabilities of a <strong>Web</strong> Server...................................9-1<br />

9.1.2 Identifying Additi<strong>on</strong>al Logging Requirements ...............................................9-3<br />

9.1.3 Recommended Generic Logging C<strong>on</strong>figurati<strong>on</strong> ...........................................9-3<br />

9.1.4 Reviewing and Retaining Log Files ..............................................................9-3<br />

9.1.5 Automated Log File Analysis Tools ..............................................................9-5<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!