27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

8.3 Checklist for Implementing a Secure Network Infrastructure<br />

Completed<br />

Identify network locati<strong>on</strong><br />

Acti<strong>on</strong><br />

<strong>Web</strong> server is located in a DMZ, or <strong>Web</strong> server hosting is outsourced<br />

Assess firewall c<strong>on</strong>figurati<strong>on</strong><br />

<strong>Web</strong> server is protected by a firewall; if it faces a higher threat or is more vulnerable, it is<br />

protected by an applicati<strong>on</strong> layer firewall<br />

Firewall c<strong>on</strong>trols all traffic between the Internet and the <strong>Web</strong> server<br />

Firewall blocks all inbound traffic to the <strong>Web</strong> server except TCP ports 80 (HTTP) and/or <str<strong>on</strong>g>44</str<strong>on</strong>g>3<br />

(HTTPS), if required<br />

Firewall blocks (in c<strong>on</strong>juncti<strong>on</strong> with the IDPS) IP addresses or subnets that the IDPS reports<br />

are attacking the organizati<strong>on</strong>al network<br />

Firewall notifies the network or <strong>Web</strong> server administrator of suspicious activity through an<br />

appropriate means<br />

Firewall provides c<strong>on</strong>tent filtering (applicati<strong>on</strong> layer firewall)<br />

Firewall is c<strong>on</strong>figured to protect against DoS attacks<br />

Firewall detects malformed or known attack URL requests<br />

Firewall logs critical events<br />

Firewall and firewall OS are patched to latest or most secure level<br />

Evaluate intrusi<strong>on</strong> detecti<strong>on</strong> and preventi<strong>on</strong> systems<br />

Host-based IDPS is used for <strong>Web</strong> servers that operate primarily using SSL/TLS<br />

IDPS is c<strong>on</strong>figured to m<strong>on</strong>itor network traffic to and from the <strong>Web</strong> server after firewall<br />

IDPS is c<strong>on</strong>figured to m<strong>on</strong>itor changes to critical files <strong>on</strong> <strong>Web</strong> server (host-based IDPS or<br />

file integrity checker)<br />

IDPS blocks (in c<strong>on</strong>juncti<strong>on</strong> with the firewall) IP addresses or subnets that are attacking the<br />

organizati<strong>on</strong>al network<br />

IDPS notifies the IDPS administrators or <strong>Web</strong> server administrator of attacks through<br />

appropriate means<br />

IDPS is c<strong>on</strong>figured to maximize detecti<strong>on</strong> with an acceptable level of false positives<br />

IDPS is c<strong>on</strong>figured to log events<br />

IDPS is updated with new attack signatures frequently (e.g., <strong>on</strong> a daily basis)<br />

Host-based IDPS is c<strong>on</strong>figured to m<strong>on</strong>itor the system resources available in the <strong>Web</strong> server<br />

host<br />

Assess network switches<br />

Switches are used to protect against network eavesdropping<br />

Switches are c<strong>on</strong>figured in high-security mode to defeat ARP spoofing and ARP pois<strong>on</strong>ing<br />

attacks<br />

Switches are c<strong>on</strong>figured to send all traffic <strong>on</strong> network segment to network-based IDPS<br />

Evaluate load balancers<br />

Load balancers are used to increase <strong>Web</strong> server availability<br />

Load balancers are augmented by <strong>Web</strong> caches if applicable<br />

Evaluate reverse proxies<br />

Reverse proxies are used as a security gateway to increase <strong>Web</strong> server availability<br />

Reverse proxies are augmented with encrypti<strong>on</strong> accelerati<strong>on</strong>, user authenticati<strong>on</strong>, and<br />

c<strong>on</strong>tent filtering capabilities, if applicable<br />

8-13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!