Page 278 - StudyBook.pdf
P. 278

262    Chapter 5 • Communication Security: Web Based Services

             Logging Activity

             Logging, auditing, or monitoring the activity on a Web server becomes more
             important as the value of the data stored on the server increases.The monitoring
             process should focus on attempts to perform actions that are atypical for a Web
             user.These actions include, among others:

                  ■   Attempting to execute scripts
                  ■   Trying to write files
                  ■   Attempting to access files outside the Web root

                 The more traffic a Web server supports, the more difficult it becomes to review
             the audit trails.An automated solution is needed when the time required to review
             log files exceeds the time administrators have available for that task. Intrusion
             detection systems (IDSes) are automated monitoring tools that look for abnormal
             or malicious activity on a system.An IDS can simply scan for problems and notify
             administrators or can actively repel attacks once they are detected. IDSes and
             Intrusion Prevention Systems (IPSes) are covered in depth in Chapter 7,
             “Infrastructure Security:Topologies and IDS.”

             Performing Backups
             Unfortunately, every administrator should assume that the Web server will be com-
             promised at some point and that the data hosted on it will be destroyed, copied, or
             corrupted.This assumption will not become a reality in all cases, but planning for
             the worst is always the best security practice.A reliable backup mechanism must be
             in place to protect the Web server from failure.This mechanism can be as complex
             as maintaining a hot spare (to which Web services will automatically failover if the
             primary Web server goes down), or as simple as a daily backup to tape. Either way,
             a backup is the only insurance available that allows a return to normal operations
             within a reasonable amount of time. If security is as much maintaining availability
             as it is maintaining confidentiality, backups should be part of any organization’s
             security policy and backups of critical information (such as Web sites) should be
             stored offsite. Backups, disaster recovery planning, and how to continue on with
             business after an attack are covered in depth in Chapter 12,“Operational and
             Organizational Security: Security Policies and Disaster Recovery.”









          www.syngress.com
   273   274   275   276   277   278   279   280   281   282   283