Web Server Requirement

Installing Prerequisites for Configuration Manager 2012 R2

The Lab was hit by the Gmail phishing attack with the subject "... has shared a document on Google Docs with you". However, actions were taken by IT to remove the threat behind the scenes in Google Apps. No Lab Google accounts are currently affected or at risk from this attack.

Web Server Requirement: OS and Application

One of the recent trends in cyber security is increasing attacks on web servers. Web servers have become valuable targets for attackers. Attackers use the web servers to host phishing sites and malware and to boost index rankings on Google and Yahoo for the attacker's other malicious sites.

SSL Certificate Requirements

SSL certificates serve two important functions. First, they permit communication with a web server to be encrypted. Web servers commonly use encryption to protect private data, such as passwords. Second, SSL certificates allow visitors to validate the website they're communicating with is authentic (and not, for instance, a malicious copy intended to trick visitors into disclosing passwords).

There are two options for SSL certificates: (1) self-signed or (2) certificate authority (CA) signed. Self-signed certificates do not allow the same level of validation and create confusing browser warning messages. We recommend web servers use CA signed certificates. CA signed certificates are cheap and easy to acquire via the process here. Valid CA signed certificates are required for web servers with any of the following characteristics:

  • High level of visibility
  • Uses institutional credentials, such as Berkeley Lab Identity (LDAP) or Windows Active Directory
  • Hosts a business or administrative service used by the broad Lab community
  • Production IT Division web servers

Minimum Security Requirement Are Not Enough

The Minimum Security Requirements are insufficient for web servers, which are exposed to numerous attack vectors. Running a web server requires diligence in monitoring the cyber environment. Extra caution needs to be paid to web servers, including exceptionally fast patching of OS and service (including web server) vulnerabilities. Strong, restrictive host-based firewalls are strongly recommended. There is a greater expectation that you, the system administrator, will be attentive to the web server. That means actively reviewing logs, understanding new security issues, and checking in on content. Lastly, the web server software itself is a target of attack. Attackers are very proficient at taking advantage of the smallest misconfiguration. It is beyond the scope of this document to describe every configuration, instead we advise you review the configuration and best practices for your web server software (Apache, IIS, etc).

Separate Other Resources From Web Servers

If the web server is successfully attacked, other resources on the server are also put at risk. For example, if you host your web server on the same box where your personal files are stored, you personal files are at a greater risk. In extreme cases we have seen web servers acting as NFS and NIS servers. CPP advises that you dedicate a web server to the single function of being a web server. Do not run other services, especially those that offer authentication or other security resources, on a web server.

Popular packages must be maintained

Applications like open source wikis, photo galleries, content management systems, and blogs are a growing vector of attack. These are increasingly popular applications because they are easy to setup and feature rich. However, these applications are targeted and attacked within hours of announced vulnerabilities. Some recent examples include Joomla, Drupal, Mediawiki, and struts2 based applications. If you run popular web applications or frameworks, you must subscribe to the security lists of these products and immediately patch them when vulnerabilities are announced.

It is important you understand that the usual leeway provided by LBNL's security defenses is of no use in the case of these attacks. These products are typically attacked directly with no prior indication of malicious behavior, and signatures for perimeter protection may not yet be available. It is incumbent on you to patch these web applications quickly.

Vulnerabilities must be addressed

Several type of web vulnerabilities are used to launch the majority of attacks. The most damaging of these are SQL injection attacks, which can allow an attacker to read, write, or modify the contents of a database through the web application. Cross-site scripting (XSS) can enable particular tricky social engineering attacks. For these reasons, the cyber security team scans web applications for these type of vulnerabilities on a regular basis. If these vulnerabilities are found and not addressed, the web server will be unregistered.

Related posts: