Apache Web Server Hardening
|
|
|
- Walter Dickerson
- 10 years ago
- Views:
Transcription
1 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:197 Appendix D Apache Web Server Hardening Solutions in this chapter: Understanding Common Vulnerabilities With Apache Web Server Patching and Securing the OS Hardening the Apache Application Monitoring the Web Server for Secure Operation A:197
2 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:198 A:198 Appendix D Apache Web Server Hardening Understanding Common Vulnerabilities Within Apache Web Server As we discussed in the previous appendix, all software systems have four general types of vulnerability. Apache is no different and can be negatively affected by any one of the following problems: Poor application configuration Unsecured Web-based code Inherent Apache security flaws Foundational OS vulnerabilities We ll investigate these four types in detail through the remaining sections of this appendix. Poor Application Configuration Like the Microsoft IIS Web server, Apache has many default settings that require modification for secure operation. Nearly all configuration information for Apache Web server exists within the httpd.conf file and associated Include files. Because many configuration options exist within these files, it can be easy to make configuration errors that expose the application to attack. Unsecured Web-Based Code The second manner in which vulnerabilities are exposed is via poorly implemented code on the Apache server. Often, Web developers are far more concerned with business functionality than the security of their code. For instance, poorly written dynamic Web pages can be easy DoS targets for attackers, should coded limitations be absent from backend database queries. Simply publishing confidential or potentially harmful information without authentication can provide enemies with ammunition for attack. For these reasons, you must review and understand not only the Apache application but the information and functionality being delivered via the system. Inherent Apache Security Flaws Like the IIS server, vulnerabilities can exist within the Apache application code itself.there are many means by which hackers can breech or disable an Apache system, such as: Denial of service Buffer overflow attacks Attacks on vulnerable scripts URL manipulation
3 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:199 Occasionally, Apache security flaws are discovered and announced by Apache or by various security groups.the Apache development team is typically quick to respond and distribute patches in response to such events. For this reason, it is critical that you remain vigilant in your attention to security newsgroups and to Apache s security advisory site at Foundational OS Vulnerabilities Another source of vulnerability within an Apache Web server could occur as a result of foundational security flaws in the OS on which Apache is installed. Apache can be run on just about any OS.You should be very familiar with the specific security vulnerabilities for any OS on which you run Apache.This brings us to the next section, in which we discuss the merits of patching and securing the Microsoft OS. Patching and Securing the OS As we discussed in the previous sections and chapters of this book, code deficiencies can exist in OSs and lead to OS and application vulnerabilities. It is therefore imperative that you fully patch newly deployed systems and remain current with all released functional and security patches. At regular intervals, thoroughly review the published vulnerabilities at your OS manufacturer s Web site. Some popular OSs and their respective security sites are listed in Table D.1. Table D.1 Popular Operating Systems and Their Security Sites Apache Web Server Hardening Appendix D A:199 Operating System Sun Solaris Microsoft Mac OS Debian Linux RedHat Linux SuSe Linux FreeBSD NetBSD OpenBSD Vendor Security Information Site It might be a good idea to subscribe to your OS vendor s security mailing list to receive security-related updates and to monitor security newsgroups for 0-day exploits.
4 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:200 A:200 Appendix D Apache Web Server Hardening Patching Unix, Linux, and BSD Operating Systems Because Apache is so often run on various Unix, Linux, and BSD distributions, we include patching steps so that you can confidently deploy your Apache Web server on a well-hardened foundational OS.The steps required to patch specific Unix, Linux, and BSD OS are included in Implementation:The Quick and Dirty Details of Chapter 3, UNIX DMZ Design. Refer to these sections for more detailed information. In general, however, each vendor provides a full suite of tools and information designed to help you remain current of their released software updates. Become familiar with each of your vendor s OS patching methodologies and software tools. As the security administrator, you should reserve predetermined time periods for maintenance windows during episodes of low customer activity. However, the discovery of serious OS vulnerabilities could necessitate emergency downtime while patches are applied. Configuring a Secure Operating System Like patching, all systems used to provide services such as HTTP and HTTPS to customers should be thoroughly hardened before they are placed in a production environment. Hardening includes many steps such as the following: Setting file permissions Locking down accounts Establishing proper OS security policies Configuring host-based firewalls Disabling vulnerable services These are just a few examples of the general tasks required to initially secure your OS. For the detailed steps required to secure specific Unix, Linux, and BSD OS, refer to Implementation:The Quick and Dirty Details of Chapter 3, UNIX DMZ Design. For specific information about hardening Microsoft Windows OS, refer to Appendix A, IIS Web Server Hardening. Now that we have a solid, secure OS, let s move on to discuss how to properly install and securely configure the Apache Web server. Hardening the Apache Application The Apache Web server is a powerful application through which you can deliver critical business functionality to customers. With this power comes the possibility of misuse and attack.to ensure that your Apache server is running securely, we have compiled a series of steps to harden the Apache application.you might also want to read additional information
5 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:201 Apache Web Server Hardening Appendix D A:201 or review other Apache security checklist documents before deploying your Apache server. Two excellent reference guides are the CIS Apache Benchmark document available at the Center for Internet Security ( and the NIST Apache Benchmark document available at You should follow three general steps when securing the Apache Web server as follows: Prepare the OS for Apache Web server Acquire, compile, and install the Apache Web server software Configure the httpd.conf file Within these general tasks there are many steps, which we cover in the following sections. Prepare the OS for Apache Web Server After you d patched and hardened your OS, you ll need to accomplish a couple quick tasks prior to obtaining, compiling, and installing the Apache software. A critical part of installing Apache is to provide a user account and group that will run the Web server. It is important that the user and group you select be unique and unprivileged to avoid reduce exposure to attack. WARNING Do not run your Apache Web server as the user Nobody. Although this is often a system administrator favorite and seemingly unprivileged account for running Apache and other services, the Nobody account has historically been used for root-like operations in some OSs and should be avoided. Choose and configure a user and group account using the following Unix OS steps. In this example, we will use wwwusr and wwwgrp as the Apache username and group, respectively. 1. As root from the command line, type groupadd wwwgrp to add a group. 2. Type useradd d /usr/local/apache/htdocs g wwwgrp c Apache Account m wwwusr to add the user. The second step creates the user account but also creates a home directory for the user in /usr/local/apache/htdocs. After creating the user and group accounts, you ll need to lock down the wwwusr user account for use with Apache. By locking the account and providing an unusable shell, this action ensures that no one can actually log into the Web server using the Apache account: 1. As root from the command line, type passwd l wwwusr to lock the Apache account.
6 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:202 A:202 Appendix D Apache Web Server Hardening 2. Type usermod s /bin/false wwwusr to configure an unusable shell account for the Apache account. Now you re ready to get the Apache software and begin installation. Acquire, Compile, and Install Apache Web Server Software Because Apache is open-source software, you can freely download the binaries or source code and get going with your installation. Although there are many locations from which you could download the software, it is always best to obtain the Apache software directly from an approved Apache Foundation mirror listed at You ll need to decide whether to install the server using precompiled binaries or to compile the source code yourself. From a security and functionality perspective, it is usually better to obtain the source code and compile the software, since doing so permits finetuning of security features and business functionality. In this section, we ll discuss compiling the Apache server from source code. To download the source code, point your browser at the URL listed previously, select a mirror, and select the latest Apache source code distribution. While you re on the Apache mirror site, also download the MD5 checksum, which should be available in the same directory as the source code.the checksum file will look identical to the source code tarball but will have an.md5 file extension. We ll use this checksum to verify the integrity of our Apache source code. Verify Source Code Integrity To verify the checksum, you ll need additional software called md5sum that might be part of your OS distribution. If it s not, you can download the software as part of GNU Textutils available at verify the Apache checksum, perform the following steps. In this example, we ll use Apache version 2.2.3: 1. As root from the command line, change directories to where you downloaded the Apache source code tarball and checksum file. 2. Type cat httpd tar.gz.md5 to see the exact md5 checksum string.you should see something like f72ffb176e2dc7b322be16508c09f63c httpd tar.gz. 3. From the same directory, type md5sum httpd tar.gz.md5 to obtain the checksum from the tarball.you should see the identical string shown in Step 2. If you do, the software you downloaded is authentic.
7 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:203 Compile the Source Code Apache Web Server Hardening Appendix D A:203 After downloading and verifying the Apache source code, you ll need to do some research to understand what options you want to compile into your Web server.there are many modules, such as mod_access and mod_ssl, that can be added into your server to provide additional functionality and security. A full list of Apache Foundation-provided modules can be found at When choosing modules, be sure you select only what you need. Compiling extra, unnecessary modules will only result in a less secure, slower Web server. WARNING Use caution in enabling and disabling services at compile time. Before you do so, determine the dependencies of your Web server code. For instance, do you need CGI functionality on your site? Failure to understand what services you require to operate could result in loss of critical functionality. It might be prudent to test your configuration in a lab environment before disabling services on a production server. Once you ve decided which modules and configurations to use, you should accomplish one final task before building your software: Obscure the Apache version information located in the ap_release.h file located in the ${ApacheSrcDir}/include directory.to do so, vi the file and alter the following lines to change the Software Vendor (Apache Software Foundation) information: #define AP_SERVER_BASEVENDOR "Apache Software Foundation" #define AP_SERVER_BASEPRODUCT "Apache" In general, you ll need to perform three steps to compile and install your Apache Web server, as follows: 1. From the ${ApacheSrcDir} directory, run./configure. 2. After configuring source, run./make to compile the software. 3. After compiling the software, run./make install to install the Apache Web server. During the first step, you ll decide what is added to the Apache server at compile time. Table D.2 includes a list of modules you may consider adding and removing from your configuration:
8 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:204 A:204 Appendix D Apache Web Server Hardening Table D.2 Modules You Can Add or Remove Add/Remove Module Name Purpose Remove Status Provides potentially dangerous information via server statistics Web page Remove Info Provides potentially dangerous configuration information Remove Autoindex Creates directory listing when index files are absent from Web directories Remove Include Provides server-side include (SSI) functionality Remove Imap Creates server-side index file mapping Remove userdir Permits users to create personal homepages in ~user home directories Remove charset-lite Enables character set translation Remove env Modifies environment variables passed to CGI and SSI scripts Remove setenvif Enables environment variable determination Remove asis Permits documents to be sent without standard headers Remove cgi Enables CGI scripts Remove negotiation Permits standard HTTP1.1 content negotiation Remove actions Permits CGI script execution Remove alias Enables URL redirection and file system mapping Add mod_ssl Provides cryptography using the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols Add mod_log_forensic Increases granularity of logging to forensic levels Add mod_unique_id Required for mod_log_forensic module NOTE To enable SSL for HTTPS operation in your Apache Web server, you ll need to download, compile, and install OpenSSL, which is available at
9 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:205 Mod_security Apache Web Server Hardening Appendix D A:205 mod_security, a third-party Apache module available from provides application firewall intrusion protection and prevention.to enable mod_security, you must download and compile the software into the Apache Web server. Adding mod_security increases the secure operation of your Apache Web server and adds functionality including, but not limited to, the following: HTTP protocol awareness Anti-evasion technique prevention such as URL encoding validation and URL decoding Enhanced audit logging Built-in chroot functionality Buffer overflow protection HTTPS filtering We ll enable mod_security in our example because it adds so many security features to our system. Once you have downloaded the mod_security source from download/index.html, perform the following steps as root: cd ${modsecuritysrcdir}/apache2 mkdir -r ${ApacheSrcDir}/modules/security cp mod_security.c Makefile.in config.m4 \ ${ApacheSrcDir}/modules/security cd ${ApacheSrcDir}./buildconf Now mod_security appears like other Apache modules. When we compile Apache, we ll enable it using the command enable-security. Using the previous listed configurations, your configure statement would look something like the following:./configure -prefix=/usr/local/apache \ --enable-so \ --enable-ssl \ --enable-security \ --enable-unique-id \ --enable-log-forensic \ --disable-info \ --disable-status \ --disable-autoindex \ --disable-imap \ --disable-include \ --disable-userdir \ --disable-auth \
10 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:206 A:206 Appendix D Apache Web Server Hardening --disable-charset-lite \ --disable-env \ --disable-setenvif \ --disable-asis \ --disable-cgi \ --disable-negotiation \ --disable-actions \ --disable-alias The command configures the Apache software to be installed in /usr/local/apache and to be built with our module options.there are many options to consider in configuring the Apache source code for compilation.to view a list of options, issue the command./configure help from the ${ApacheSrcDir} directory. After successfully configuring the source code, proceed with Steps 2 and 3. On successful completion, you should see a message similar to the one shown in Figure D.1. Figure D.1 Successful Completion Message You now have successfully built and installed the Apache 2.2 HTTP server. To verify that Apache actually works correctly you now should first check the (initially created or preserved) configuration files /usr/local/apache/conf/httpd.conf and then you should be able to immediately fire up Apache the first time by running: /usr/local/apache/bin/apachectl start Thanks for using Apache. The Apache Group Now that we ve successfully installed the Apache Web server software, let s proceed to the next step: configuring the httpd.conf file for secure operation. Configure the httpd.conf File The Apache Web server stores all its configuration data in the httpd.conf file located in the ${ApacheServerRoot} directory, which is, in our example, /usr/local/apache.the httpd.conf file includes many directives that can be categorized into the following sections: Server Directives User Directives
11 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:207 Apache Web Server Hardening Appendix D A:207 Performance/Denial of Service (DoS) Directives Server Software Obfuscation Directives Access Control Directives Authentication Mechanisms Directory Functionality Directives Logging Directives Not all directives play a significant role with regard to security. In the following sections, we ll discuss the directives that impact the security of your Apache server. Furthermore, because we disabled a lot of functionality at compile time, some directives that would normally be dangerous don t need to be removed, since they weren t added into the compiled Apache binaries.there may also be other configuration files, called Include files, associated with the httpd.conf file. Since we have enabled mod_security, there is a long list of potential configurations to make in an Include file called modsecurity.conf, which is usually located in the ${ApacheServerRoot}/conf directory. In this section, we ve included the Modsecurity.com-recommended mod_security configuration. For more information about configuring this file, refer to the mod_security documentation found at Recommended modsecurity.conf File # Turn ModSecurity On SecFilterEngine On # Reject requests with status 403 SecFilterDefaultAction "deny,log,status:403" # Some sane defaults SecFilterScanPOST On SecFilterCheckURLEncoding On SecFilterCheckUnicodeEncoding Off # Accept almost all byte values SecFilterForceByteRange # Server masking is optional # SecServerSignature "OurServer" SecUploadDir /tmp SecUploadKeepFiles Off
12 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:208 A:208 Appendix D Apache Web Server Hardening # Only record the interesting stuff SecAuditEngine RelevantOnly SecAuditLog logs/audit_log # You normally won't need debug logging SecFilterDebugLevel 0 SecFilterDebugLog logs/modsec_debug_log # Only accept request encodings we know how to handle # we exclude GET requests from this because some (automated) # clients supply "text/html" as Content-Type SecFilterSelective REQUEST_METHOD "!^(GET HEAD)$" chain SecFilterSelective HTTP_Content-Type \ "!(^application/x-www-form-urlencoded$ ^multipart/form-data;)" # Do not accept GET or HEAD requests with bodies SecFilterSelective REQUEST_METHOD "^(GET HEAD)$" chain SecFilterSelective HTTP_Content-Length "!^$" # Require Content-Length to be provided with # every POST request SecFilterSelective REQUEST_METHOD "^POST$" chain SecFilterSelective HTTP_Content-Length "^$" # Don't accept transfer encodings we know we don't handle SecFilterSelective HTTP_Transfer-Encoding "!^$" User Directives There are a couple directives you must configure in the httpd.conf file to ensure that the Apache Web server runs using the unprivileged user account we established earlier, among other things. Inspect your httpd.conf file to verify that the following statements appear as shown in the following. Recall that we decided to run Apache as wwwusr:wwwgrp. User wwwusr Group wwwgrp Also, configure the ServerAdmin directive with a valid alias address such as the following: ServerAdmin [email protected] This will provide a point of contact for your customers, should they experience problems with your site.
13 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:209 Apache Web Server Hardening Appendix D A:209 Performance/Denial-of-Service (DoS) Directives There are a number of performance-tuning directives in the Apache httpd.conf file. As a security professional, you should interpret these directives as DoS prevention statements, since they control resource allocation for users of the Apache server.the following directives control the performance of an Apache server: Timeout Configures the time Apache waits to receive GET requests, the time between TCP packets for POST or PUT requests, or the time between TCP ACK statements in responses.the Apache default is 300 seconds (5 minutes), but you might want to consider reducing this timer to 60 seconds to mitigate DoS attacks. KeepAlive Configures HTTP1.1-compliant persistency for all Web requests. By default, this is set to On and should remain as such to streamline Web communication. KeepAliveTimeout Determines the maximum time to wait before closing an inactive, persistent connection. Let s keep this value at the default of 15 seconds, since raising it can cause performance problems on busy servers and expose you to DoS attacks. StartServers Designates the number of child processes to start when Apache starts. Setting this value higher than the default of 5 can increase server performance, but use care not to set the value too high, because doing so could saturate system resources. MinSpareServers This setting, like the MaxSpareServers setting, allows for dynamic adjustment of Apache child processes. MinSpareServers instructs Apache to maintain the specified number of idle processes for new connections.this number should be relatively low except on very busy servers. MaxSpareServers Maintains Apache idle processes at the specified number. Like MinSpareServers, this value should be low, except for busy sites. MaxClients As its name implies, this setting determines the maximum number of concurrent requests to the Apache server. We ll leave this at the default value of 256. Once you ve finished editing this section of your httpd.conf file, you should see something similar to the following: Timeout 60 KeepAlive On KeepAliveTimeout 15 StartServers 5 MinSpareServers 10 MaxSpareServers 20 MaxClients 256
14 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:210 A:210 Appendix D Apache Web Server Hardening Server Software Obfuscation Directives By default, Apache informs Web users of its version number when delivering a 404 (page not found) error. Since it is good practice to limit the information you provide to would-be hackers, we ll disable this feature. Recall that we already altered the Apache server signature and that we installed mod_security. Both of these actions should be enough to obfuscate our server because they both alter the default behavior. If you would like to turn off server signatures completely, you can always set the ServerSignature directive to Off and the ServerTokens to Prod.This will disable Apache signatures entirely. Access Control Directives The Apache Web server includes mechanisms to control access to server pages and functionality.the statement syntax is part of the <Directory> directive and is fairly straightforward; you specify a directory structure, whether default access is permitted or denied, and the parameters that enable access to the directory if access is denied by default.there are many options for fine-grained control that you should learn by reading Regardless of the access you provide to your customers, you should secure the root file system using access control before placing your server into a production environment. In your httpd.conf file, you should create a statement in the access control directives area as follows: <Directory /> Order Deny, Allow deny from all </Directory> This statement will deny access to the root file system should someone intentionally or accidentally create a symlink to /. Authentication Mechanisms Apache also includes several ways in which you can authenticate customers using your Web server such as LDAP, SecureID, and basic.htaccess, to name a few examples.to use authentication mechanisms beyond basic.htaccess, you must compile additional functionality when you re building Apache. Like access control, authentication mechanisms are specified as part of the <Directory> directive. The two steps to enabling basic.htaccess user authentication are: 1. Creating an htpasswd file to store user credentials. 2. Adding a <Directory> directive to the httpd.conf file to protect a directory structure.
15 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:211 Let s use an example to demonstrate how easy it can be to add authentication. In our example, we ll secure a directory called /secure and permit only customers Elise and Margot access to the files in that directory. First, let s create an htpasswd file somewhere not in the Web server document root by issuing the following command: htpasswd -c /usr/local/apache/passwdfile elise New password: ***** Re-type new password: ***** Adding password for user elise Next, we ll add Margot to the list as well.this time we don t need to use the c argument, since our htpasswd file already exists: htpasswd /usr/local/apache/passwdfile margot New password: ***** Re-type new password: ***** Adding password for user margot Now that we ve established our customer accounts, we ll finish by adding a <Directory> directive to the httpd.conf file to protect the /secure directory as follows: <Directory /usr/local/apache/htdocs/secure> AuthType Basic AuthName "Access for authenticated customers only" AuthUserFile /usr/local/apache/passwdfile Require user margot elise </Directory> Now, when anyone attempts to access the /secure directory, they ll be prompted for a username and password. Because we specifically require only Margot and Elise, only they will be permitted to use the directory structure, if they authenticate properly. Let s move on to discuss a couple other security-related <Directory> directives. Directory Functionality Directives Within the <Directory> directive is a subdirective called Options that controls functionality for the directory structures specified in the <Directory> directive.the available options are listed in Table D.3. Table D.3 Directory Options Apache Web Server Hardening Appendix D A:211 Option All ExecCGI Functionality Default setting; includes all options except MultiViews Permits CGI script execution through mod_cgi Continued
16 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:212 A:212 Appendix D Apache Web Server Hardening Table D.3 continued Directory Options Option FollowSymLinks Includes IncludesNOEXEC Indexes MultiViews SimLinksIfOwnerMatch Functionality Allows Apache to follow OS file system symlinks Permits SSI through mod_include Permits SSI but denies exec and exec cgi Allows autoindexing using mod_autoindex if no configured index file is present Permits content negotiation using mod_negotiation Allows Apache to follow OS file system symlinks but only if the link and target file have the same owner Many of the listed options are not relevant to our installation, since we disabled Includes and CGI during compile time. Regardless, a good default <Directory> directive disabling most options is shown her: <Directory "/usr/local/apache/htdocs"> Order allow,deny Allow from all Options FollowSymLinks ExecCGI Includes Indexes \ -MultiViews AllowOverride None </Directory> At this point, your Apache server should be relatively secure. Let s discuss some Apache logging directives so that we can better monitor our server. Logging Directives There are many reasons to configure logging on your Apache server. Whether helping you see top page hits, hours of typical high volume traffic, or simply understanding who s using your system, logging plays an important part of any installation. More important, logging can provide a near-real-time and historic forensic toolkit during or after security events. In this section, we examine some logging configuration best practices. To ensure that your logging directives are set up correctly, we ll provide an example of the Logging options in the Apache Web server. Apache has many options with which you should familiarize yourself by reading config.html#logformat.this will help you understand the best output data to record in logs. Also, recall that we compiled Apache with mod_log_forensic, which provides enhanced granularity and logging before and after each successful page request. An example logging configuration is shown here: ErrorLog /var/log/apache/error.log LogLevel info
17 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:213 Apache Web Server Hardening Appendix D A:213 LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" \"%{forensic-id}n\" %T %v" full CustomLog /var/log/apache/access.log combined ForensicLog /var/log/apache/forensic.log This example provides a customized logging format that includes detailed output and places all the log files in the /var/log/apache directory. TIP It is good practice to archive your system and Apache log files to backup location. This prevents loss of critical forensic data due to accidental deletion or malicious activity. Remove Default/Unneeded Apache Files After you ve installed and configured your Apache server, you ll need to do some quick cleanup of files that could represent a security threat. In general, you should not leave the source code you used to compile Apache on the file system. It s a good idea to tar the files up and move them to a secure server. Once you ve done so, remove the source code from the Apache Web server. You ll also want to remove some of the default directories and files installed by the Apache Web server.to do so, execute the following commands on your Web server. If you have added content into your document root directory, you ll want to avoid the first command: rm fr /usr/local/apache/htdocs/* rm fr /usr/local/apache/cgi-bin rm fr /usr/local/apache/icons After removing files, let s ensure that our Apache files have proper ownership and permissions before starting our server. Update Ownership/Permissions As we discussed previously, the Apache Web server should be run as an unprivileged and unique account. In our example, we used the user wwwusr and the group wwwgrp to run our server. Let s make sure our permissions are properly set by running the following commands: chown R root:wwwgrp /usr/local/apache/bin chmod R 550 /usr/local/apache/bin chown R root:wwwgrp /usr/local/apache/conf chmod R 660 /usr/local/apache/conf
18 403_Ent_DMZ_AD.qxd 10/25/06 12:08 PM Page A:214 A:214 Appendix D Apache Web Server Hardening chown R root:wwwgrp /usr/local/apache/logs chmod R 664 /usr/local/apache/logs chown R root /usr/local/apache/htdocs chmod R 664 /usr/local/apache/htdocs Monitoring the Server for Secure Operation Even with the best defenses and secure configurations, breeches in your systems and applications could occur. Therefore, you cannot simply set up a hardened Apache Web server and walk away thinking that everything will be just fine. Robust and comprehensive monitoring is perhaps the most important part of securely operating servers and applications on the Internet. Throughout this book, we have discussed myriad techniques to ensure your IT security. You must leverage all these secure DMZ functions in your job. With regard to Apache, there are several things to consider that will help you identify and react to potential threats. Your primary source of data will be through Apache and OS logs. Even with small Web sites, however, sifting through this information can be a challenge. One of the first things to consider is integrating your Apache logs with other tools to help organize and identify the potential incident needles in your log file haystack. Many open-source and commercial products are available to aid you in securing your site. Once such open-source tool is called Webalizer, available at which features graphical representation of your Apache log file contents. SNMP polling and graphing constitute another methodology commonly employed for secure monitoring. Often, it is extremely difficult to gauge the severity or magnitude of an event without visualization of data from logs or SNMP counters. One tool you might consider using is a module called mod_apache_snmp, available at module can provide real-time monitoring of various metrics including, but not limited to: Load average Server uptime Number of errors Number of bytes and requests served You might consider other commercial SNMP-based solutions, especially for enterprisescale deployments.these tools help expedite monitoring deployment and usually include enhanced functionality to automatically alert you when important thresholds, such as Web site concurrent connections, are crossed.
IIS Web Server Hardening
403_Ent_DMZ_AC.qxd 10/25/06 12:04 PM Page A:183 Appendix C IIS Web Server Hardening Solutions in this chapter: Understanding Common Vulnerabilities with Microsoft IIS Web Server Patching and Securing the
Installing Apache Software
Web Server Web Server Is a software application that uses the HyperText Transfer Protocol. Running on computer connected to Internet. Many Web Server software applications: Public domain software from
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Securing the Apache Web Server
Securing the Apache Web Server Jaqui Lynch Mainline Information Systems Email [email protected] Session I12 Agenda Anatomy of a Web Transaction General Firewall and Network Web Server Parameters
Addressing Application Layer Attacks with Mod Security
Addressing Application Layer Attacks with Mod Security This article sheds some light on some of the important concepts pertaining to Web Application Firewalls (WAF). We have also looked at the Mod_Security
1Intro. Apache is an open source HTTP web server for Unix, Apache
Apache 1Intro Apache is an open source HTTP web server for Unix, Microsoft Windows, Macintosh and others, that implements the HTTP / 1.1 protocol and the notion of virtual sites. Apache has amongst other
LAMP Secure Web Hosting. A.J. Newmaster & Matt Payne 8/10/2005
LAMP Secure Web Hosting A.J. Newmaster & Matt Payne 8/10/2005 How do I lock down my server? & ModSecurity is an open source intrusion detection and prevention engine for web applications. Operating as
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Apache based WebDAV Server with LDAP and SSL
Saqib Ali [email protected] Revision History Revision v3.4 2002 06 29 Revised by: sa Added the section "How to generate a CSR" Revision v3.3 2002 04 14 Revised by: sa Add the section of DAV server management.
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
How To Configure Apa Web Server For High Performance
DEPLOYMENT GUIDE Version 1.0 Deploying F5 with Apache Web Servers Table of Contents Table of Contents Deploying the BIG-IP LTM with the Apache web server Prerequisites and configuration notes... 1 Product
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
INTRUSION DETECTION AND PREVENTION SYSTEM: CGI ATTACKS. A Thesis. Presented to. The Faculty of the Department of Computer Science
INTRUSION DETECTION AND PREVENTION SYSTEM: CGI ATTACKS A Thesis Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for the
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
mod_security... ...the web application firewall
mod_security......the web application firewall Copyright 2005 - AKERSIA Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. State
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
Apache & Virtual Hosts & mod_rewrite
Apache & Virtual Hosts & mod_rewrite Jonathan Brewer Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license
SVNManager Installation. Documentation. Department of Public Health Erasmus MC University Medical Center
SVNManager Installation Documentation M. Verkerk Department of Public Health Erasmus MC University Medical Center Page 2 July 2005 Preface Version control in the context of this document is all about keeping
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
Apache 2.0 Installation Guide
Apache 2.0 Installation Guide Ryan Spangler [email protected] http://ceut.uww.edu May 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002 Table of
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop
14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure
Product Documentation. Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)
Product Documentation Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1) Contents Contents Copyright... 3 Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)...
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Configuring Ubuntu Server as a Firewall and Reverse Proxy for OWA 2007 Configuration Guide
Configuring Ubuntu Server as a Firewall and Reverse Proxy for OWA 2007 Configuration Guide Author: Andy Grogan Version 1.0 Location: http://www.telnetport25.com Contents Introduction... 3 Key Objectives:...
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in
WEB2CS INSTALLATION GUIDE
WEB2CS INSTALLATION GUIDE FOR XANDMAIL XandMail 32, rue de Cambrai 75019 PARIS - FRANCE Tel : +33 (0)1 40 388 700 - http://www.xandmail.com TABLE OF CONTENTS 1. INSTALLING WEB2CS 3 1.1. RETRIEVING THE
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Exercises: FreeBSD: Apache and SSL: SANOG VI IP Services Workshop
Exercises Exercises: FreeBSD: Apache and SSL: SANOG VI IP Services Workshop July 18, 2005 1. 2. 3. 4. 5. Install Apache with SSL support Configure Apache to start at boot Verify that http and https (Apache)
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
http://cnmonitor.sourceforge.net CN=Monitor Installation and Configuration v2.0
1 Installation and Configuration v2.0 2 Installation...3 Prerequisites...3 RPM Installation...3 Manual *nix Installation...4 Setup monitoring...5 Upgrade...6 Backup configuration files...6 Disable Monitoring
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Greenstone Documentation
Greenstone Documentation Web library and Remote Collection Building with GLI Client Web Library. This enables any computer with an existing webserver to serve pre-built Greenstone collections. As with
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0
AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Web Server: Principles and Configuration Web Programming 8) Web Server
Web Server: Principles and Configuration Web Programming 8) Web Server Emmanuel Benoist Fall Term 2013-14 Introduction Presentation of Apache Principles of a Web Server Apache Installation Apache Configuration
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
ECE 4893: Internetwork Security Lab 12: Web Security
Group Number: Member Names: ECE 4893: Internetwork Security Lab 12: Web Security Date: April 6, 2004 Date Due: April 13, 2004 Last Revised: April 2, 2004 Written by: Tom Bean and Valerio Oricchio Goal:
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.
IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
The course will be run on a Linux platform, but it is suitable for all UNIX based deployments.
Linux Apache Web Server Administration Course Description: The Linux Apache Web Server Administration course is aimed at technical staff who will be responsible for installing, configuring and maintaining
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E69079-01. April 2016
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E69079-01 April 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
noway.toonux.com 09 January 2014
noway.toonux.com p3.7 10 noway.toonux.com 88.190.52.71 Debian Linux 0 CRITICAL 0 HIGH 5 MEDIUM 2 LOW Running Services Service Service Name Risk General Linux Kernel Medium 22/TCP OpenSSH 5.5p1 Debian 6+squeeze4
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Best Practices in Hardening Apache Services under Linux
Best Practices in Hardening Apache Services under Linux Anthony Kent Web servers are attacked more frequently than anything else on the internet. Without the proper security measures it is just a matter
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming
Created by : Ashish Shah, J.M. PATEL COLLEGE UNIT-5 CHAP-1 CONFIGURING WEB SERVER
UNIT-5 CHAP-1 CONFIGURING WEB SERVER 1 APACHE SERVER The Apache Web server is the most popular Web server on the planet. Individuals and organizations use Linux primarily to create an inexpensive and stable
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
