S 2.173 Determining a web security strategy

Initiation responsibility: IT Security Officer, Top Management

Implementation responsibility: Administrator, Head of IT

Web servers are very attractive targets for attackers since a successful attack often attracts a lot of publicity. For this reason, high value must be placed on protecting web servers. Before setting up a web server, a web security strategy should be formulated that describes which security safeguards need to be implemented and in what scope. The requirements specified in the web security strategy can then be used as a basis for regular checks conducted to see if the safeguards implemented are still adequate.

The security strategy for the operation of a web server should answer the following questions:

Organisational rules and policies or the technical implementation should guarantee the following points in particular:

All regulations on the use of web servers should be recorded in writing and should be available to the employees at any time.

The editors must be trained before use of the web servers to avoid errors during operation and to ensure that they abide by the organisation's internal guidelines. In particular, they must be made aware of the possible threats involved in using the web and informed which security safeguards they need to take.

In particular, the reactions to certain security incidents possible specifically on web servers must be specified in the security strategy if the web server hosts a public web site (see also module M 1.8 Handling of security incidents).

These points also need to be taken into account even if the protection requirement of the web site is otherwise considered low. In particular, attacks by hackers and defacements can happen to any public web site, regardless of the actual protection requirements of the web site.

The regular gathering of information on potential security gaps must also be part of a security strategy so that precautions can be taken promptly. In addition to the sources of information mentioned in S 2.35 Obtaining information on security weaknesses of the system, the "World Wide Web Security FAQ" is a particularly valuable source of information on secure use of the web. The latest version of this document can be found at http://www.w3.org/Security/Faq/.

Review questions: