Page 273 - StudyBook.pdf
P. 273

Communication Security: Web Based Services • Chapter 5  257

                 logon.Authorizations over the Internet should always be considered insecure unless
                 strong encryption mechanisms are in place to protect them. Secure Sockets Layer
                 (SSL) can be used to protect Web traffic; however, the protection it offers is not sig-
                 nificant enough to protect internal accounts that are exposed on the Internet.

                 Handling Directory and Data Structures

                 Planning the hierarchy or structure of the Web root is an important part of
                 securing a Web server.The root is the highest level Web in the hierarchy that con-
                 sists of Webs nested within Webs.Whenever possible,Web server administrators
                 should place all Web content within the Web root.All the Web information (the
                 Web pages written in HTML, graphics files, sound files, and so on) is normally
                 stored in folders and directories on the Web server.Administrators can create virtual
                 directories, which are folders that are not contained within the Web server hierarchy
                 (they can even be on a completely different computer), but appear to the user to
                 be part of that hierarchy.Another way of providing access to data that is on another
                 computer is mapping drives or folders.These methods allow administrators to store
                 files where they are most easily updated or take advantage of extra drive space on
                 other computers. However, mapping drives, mapping folders, or creating virtual
                 directories can result in easier access for intruders if the Web server’s security is
                 compromised. It is especially important not to map drives from other systems on
                 the internal network.
                    If users accessing these Webs must have access to materials on another system,
                 such as a database, it is best to deploy a duplicate database server within the Web
                 server’s Demilitarized Zone (DMZ) or domain.The duplicate server should con-
                 tain only a backup, not the primary working copy of the database.The duplicate
                 server should also be configured so that no Web user or Web process can alter or
                 write to its data store. Database updates should come only from the original pro-
                 tected server within the internal network. If data from Web sessions must be
                 recorded into the database, it is best to configure a sideband connection from the
                 Web zone back to the primary server system for data transfers.Administrators
                 should also spend considerable effort verifying the validity of input data before
                 adding it to the database server.

                 Directory Properties

                 An important part of the security that can be set on a Web server is done through
                 the permissions set on directories making up the Web site.The permissions control
                 what a user or script can do within a specific directory, and allow Web administra-
                 tors to control security on a granular level.Although the procedures for setting


                                                                              www.syngress.com
   268   269   270   271   272   273   274   275   276   277   278