designing security for web servers

Download Report

Transcript designing security for web servers

1
Chapter 12
DESIGNING
SECURITY FOR
WEB SERVERS
Chapter 12: Designing Security for Web Servers
HARDENING IIS
 Upgrade to Windows Server 2003
 Select minimal application server role
components
 Use IP address restrictions
 Use SSL encryption
 Restrict Web-site permissions
 Use firewalls
2
Chapter 12: Designing Security for Web Servers
APPLICATION SERVER COMPONENTS
 Active Server Pages
 Application Server Console
 ASP.NET
 Background Intelligent Transfer Service
(BITS) Server Extension
 Common Files
3
Chapter 12: Designing Security for Web Servers
4
APPLICATION SERVER COMPONENTS (CONT.)
 Enable Network COM+ Access
 Enable Network Distributed Transaction
Coordinator (DTC) Access
 File Transfer Protocol (FTP) Service
 Microsoft FrontPage 2002 Server Extensions
 Internet Data Connector
Chapter 12: Designing Security for Web Servers
APPLICATION SERVER COMPONENTS (CONT.)
 Internet Information Services Manager
 Internet Printing
 Message Queuing
 Network News Transfer Protocol (NNTP)
Service
 Remote Administration (Hypertext Markup
Language, or HTML)
5
Chapter 12: Designing Security for Web Servers
APPLICATION SERVER COMPONENTS (CONT.)
 Remote Desktop Web Connection
 Server Side Includes
 Simple Mail Transport Protocol (SMTP)
Service
 WebDAV Publishing
 World Wide Web Service
6
Chapter 12: Designing Security for Web Servers
IIS AUTHENTICATION
 Anonymous access
 Basic authentication
 Digest authentication
 Integrated Windows authentication
 Client-certificates authentication
 Passport authentication
7
Chapter 12: Designing Security for Web Servers
CLIENT CERTIFICATE SCENARIOS
 Internal users with your internal CA
 External users with your internal CA
 External users with their internal CA
8
Chapter 12: Designing Security for Web Servers
9
ONE-TO-ONE CERTIFICATE MAPPING
 Maps each certificate to an Active Directory
account
 User authenticate with certificate has
permissions assigned to the account
 Enables restricting resources to users
 Enables security auditing
Chapter 12: Designing Security for Web Servers
MANY-TO-ONE CERTIFICATE MAPPING
 Maps types of certificates to an Active
Directory account:
 Issued by a specific CA
 With a specific organizational unit
 With a specific first and last name
10
Chapter 12: Designing Security for Web Servers
MANY-TO-ONE CERTIFICATE MAPPING
SCREENSHOT
11
Chapter 12: Designing Security for Web Servers
ASP.NET
 Popular IIS Web application framework
 Based on the .NET Framework
 Supports CAS
12
Chapter 12: Designing Security for Web Servers
ASP.NET AUTHENTICATION TYPES
 Anonymous access
 Windows authentication
 Forms authentication
 Passport authentication
13
Chapter 12: Designing Security for Web Servers
WEB.CONFIG FILES
 Contain per-application and per-directory
security settings
 Hierarchical:
 Computer Machine.config file
 Application Web.config file
 Per-folder Web.config files
14
Chapter 12: Designing Security for Web Servers
WEB.CONFIG HIERARCHY
15
Chapter 12: Designing Security for Web Servers
WEB.CONFIG SAMPLE
<configuration>
<system.web>
<authentication mode="Windows" />
<authorization>
<deny users="?" />
</authentication>
</system.web>
</configuration>
16
Chapter 12: Designing Security for Web Servers
PUBLISHING WEB CONTENT
 Test environment
 Staging environment
 Production environment
17
Chapter 12: Designing Security for Web Servers
CONTENT MANAGEMENT ARCHITECTURE
18
Chapter 12: Designing Security for Web Servers
MONITORING IIS
 Performance monitoring
 Fault monitoring
 Security auditing
19
Chapter 12: Designing Security for Web Servers
20
MICROSOFT OPERATIONS MANAGER (MOM)
 IIS Management Pack supports:
 Availability, health, and configuration
monitoring
 Automatic IP address blocking
 Trigger any alert based on repeated events,
such as a DOS attack
Chapter 12: Designing Security for Web Servers
21
SUMMARY
 Web servers are common targets, and warrant
extra security effort
 Client certificates provide ideal intranet and
extranet authentication
 ASP.NET applications provide an additional
layer of security
 Configure ASP.NET security by using
Web.config files
 Protect confidential information with a content
management strategy
 Monitor IIS to detect failures and compromises