Guidelines for Website Security and Security Counter Measures for e-e Governance Project



Similar documents
Introduction to Cyber Security / Information Security

External Supplier Control Requirements

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Managing internet security

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

ICANWK406A Install, configure and test network security

Critical Controls for Cyber Security.

Achieving PCI-Compliance through Cyberoam

SANS Top 20 Critical Controls for Effective Cyber Defense

FISMA / NIST REVISION 3 COMPLIANCE

A Decision Maker s Guide to Securing an IT Infrastructure

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Table of Contents. Page 2/13

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Industrial Security for Process Automation

AN OVERVIEW OF VULNERABILITY SCANNERS

Cyber Security and Critical Information Infrastructure

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

INFORMATION SECURITY TRAINING CATALOG (2015)

Chapter 1 The Principles of Auditing 1

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Integrigy Corporate Overview

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

External Penetration Assessment and Database Access Review

LINUX / INFORMATION SECURITY

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Protecting Your Organisation from Targeted Cyber Intrusion

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Security Policy for External Customers

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

March

Payment Card Industry Self-Assessment Questionnaire

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Passing PCI Compliance How to Address the Application Security Mandates

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Cloud Security:Threats & Mitgations

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

BM482E Introduction to Computer Security

Web Engineering Web Application Security Issues

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

DeltaV System Cyber-Security

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Client Security Risk Assessment Questionnaire

CYBERTRON NETWORK SOLUTIONS

74% 96 Action Items. Compliance

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Networking: EC Council Network Security Administrator NSA

Firewalls Overview and Best Practices. White Paper

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Security Controls What Works. Southside Virginia Community College: Security Awareness

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)

Best Practices For Department Server and Enterprise System Checklist

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

External Supplier Control Requirements

Web App Security Audit Services

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

FORBIDDEN - Ethical Hacking Workshop Duration

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

GE Measurement & Control. Cyber Security for NEI 08-09

Secure networks are crucial for IT systems and their

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Thick Client Application Security

SECURE DATA CENTER DESIGN. Piotr Wojciechowski (CCIE #25543)

Locking down a Hitachi ID Suite server

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Network and Security Controls

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

Network Security Guidelines. e-governance

Reducing Application Vulnerabilities by Security Engineering

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Global Partner Management Notice

PCI Data Security Standards (DSS)

Franchise Data Compromise Trends and Cardholder. December, 2010

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

GFI White Paper PCI-DSS compliance and GFI Software products

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Transcription:

and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT

Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online Transactions Information Systems are essential part of critical infrastructure

Background (2/8) Security of Cyber Space - Risks Internet Systems vulnerable target for attack Systems not securely configured In recent years the attack techniques have become sophisticated Rapid proliferation of viruses and worms

Background (3/8) Security of Cyber Space - Risks Critical infrastructures such as telecommunications, transportation, energy and finance can get affected by attacks on Information infrastructures Attackers not confined to geographical boundaries

Background (4/8) Threats are Evolving

Background (5/8) The Fraud Food Chains

Background (6/8) Nature of Cyber Security Breaches Web Defacements of Information Based Websites Denial of Service Attacks (DoS) Spead of Malicious Codes Cyber Space Botnets SPAM Identity Theft & Pishing (Largely relates to banks & Financial Institutions)

Background (7/8) Effects of an Attack Unauthorized use/misuse of computing systems, defacement of websites Loss/alteration/compromise of data or software Monetary/financial loss Loss or endangerment of human life Loss of trust in computer/network system Loss of public confidence

Background (8/8) Source: CERT-IN

Guidelines for Website Security

A Web Server is a Computer host configured and connected to Internet, for serving web pages on request. Information on Public web servers can be accessed by people anywhere on the Internet.

Introduction (1/4) Common Security Threats Unauthorized access Defacement Content Theft Data Manipulation Improper usage Launch pad for external attacks Hosting improper/ malicious contents (e.g. Pishing) Denial of Service (DoS) Physical Threats

Introduction (2/4) Common Security Flaws Insufficient network boundary security controls Flaws or bugs in web hosting software (OS, Application, etc.) Insecure design and coding of hosted application Weak password Social engineering Lack of operational control

Introduction (3/4) Common Hacking/ Attack Methods CERT-In: Hacking How they do it? http://www.cert-in.org.in/advisory/ciad200303.pdf

Introduction (4/4) Defense in Depth Perimeter/Network Defense Packet filtering, State-full inspection, IDS Host Defense: Server Hardening, host IDS Application/Database Defense: IIS/Apache security, antivirus, secure coding practice

Network Security Web Hosting Network Internet Segment (External Zone) Public Server Segment (DMZ Zone) Internal Segment (Internal Network) Guidelines CERT-In: Network Perimeter Security http://cert-in.org.in/presentation/perimetersecurity.pdf NIST: A guide for selecting Network Security Products http://nist.gov.in/publications/nistpubs/800-36/nist-sp800-36.pdf

Typical Web Hosting Network

Host Security Considered the following Selection of OS of Web Server (Windows or Linux) Remove all services which is not required Update OS & Application Software regularly with latest service pack and patches A strong Password policy should be enforced Enable detailed logging including failed logging Guidelines Microsoft: Windows Server 2003 Security Center http://microsoft.com/technet/security/prodtech/win2003/default.mspx CERT-In: Securing Red Hat Linux 9.0 as a Web Server http://cert-in.org.in/guidelines/cisg-2004-01.pdf

Web Server Security Considered the following Remove all files that are not part of the Web site Third-party free modules available should not be used without proper checking and verification of their functionality and security. Configure the web server to use authentication & encryption technologies (SSL) etc. Guidelines Apache: Apache Security Guideline http://httpd.apache.org/docs/misc/security_tips.html CERT-In: Web server security guideline http://cert-in.org.in/guidelines/cisg200304.pdf

Secure Coding Practices Considered the following: Consider security implications before selecting the scripting language viz Java applets, javascripts, vbscript, PHP, etc. Common security to be considered are SQL Injection, Cross Site Scripting and Information Leakage Guidelines Open Web Application Security Project: A guide to building secure web applications http://www.owasp.org/documentation/guide MSDN: Design Guideline for secure web applications http://msdn.microsoft.com/library/default.asp

Database Security Consider the following Stay updated with latest Service Packs and Patches Remove unnecessary services and protocols Secure the Database server behind a firewall and use IDS/IPS to detect any intrusion attempts. Guidelines Microsoft: SQL Server Security Centre http://microsoft.com/technet/security/prodtech/dbsql/default.m spx CISecurity: Oracle Security Testing tools and guide http://www.cisecurity.com

Content Management Use of remote authoring tools for editing content directly on public Web site is not recommended If remote administration is required, configure computers for remote admin through a secure channel Configure web content uploading through secure communications channel e.g. SSH Content uploaded on the web server should be verified to ensure that it is free of any malicious content.

Logging and Backup Logging Use a centralized Syslog server Establish different log file names for different virtual Web sites Ensure log files are regularly archived, secured and analyzed Backup Ensure regular backup of files Maintain latest copy of Web site content on a secure host or on media Guidelines: CERT-In: Implementing Central Logging Server using syslog http://www.cert-in.org.in/syslog.htm

Physical Security Considered the following Natural Calamity Threats Physical Access Controls Electromagnetic Shielding Disaster Recovery Centre

Security Audit/Penetration Testing Available tools CISecurity: www.cisecurity.com Microsoft Windows best practice analyser Web applications stress testing http://wpoison.soundforge.net/ Vulnerability scanners i.e Retine and shadow security scanner. In Open Source, Nessus and nikto Reference: CERT-In: http://www.cert-in.org.in/securitytools.htm

Security Policy The Web Server Security Policy should incorporate - Network and Host Security Policy Web Server Backup and Logging Policy Web Server Administration and updation Policy Classification of documents to be published on Web Server Password management policy Encryption policy Physical security Guidelines NIST: Guide for Developing security plans for IT http://csrc.nist/gov/publications/nistpubs/800-18/planguide.pdf

Incident Handling and Recovery A Computer Security Incident Response Team (CSIRT) should be created within the organization to handle incidents through the following six stages of incident handling. Preparation Identification Containment Eradication Recovery Follow-up

Third Party Hosting In selecting a thrid party hosting, a user should keep the following: Hosting Servers should be located in India Hosting organization should have its infrastructure and Web server audited by auditors empanelled by CERT-In. Hosting organization should also have their Web server tested by A&P testing experts periodically.

Web Server Security Thumb Rules Web Administrators should be adequately skilled Use software only from trusted source Keep all software updated IS security audit and A&P test should be carried out regularly A dedicated machine should be used as a web server Changes to configuration should be documented (Revision control program) Central Syslog server should be used Encryption should be used

THANK YOU