S 4.222 Correct configuration of security proxies

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

This safeguard constitutes a compilation of recommendations regarding the default settings of the most important security proxies. However, the suggested settings may limit the functionality of the contents concerned (e.g. websites may no longer be opened due to the missing JavaScript) and must therefore be adapted to the individual needs.

HTTP

Filtering active content in websites is a central item for the security of the clients (see also S 4.100 Security gateways and active content). For clients with high protection requirements regarding confidentiality, active content in websites should be filtered out as a matter of principle. If required, active content may be permitted for trustworthy websites on a case-by-case basis (white list strategy). However, the corresponding white list must not become too comprehensive and must be checked and maintained at regular intervals.

The following advanced settings are recommended for HTTP proxies:

HTTPS

Regarding the process of filtering malicious programs, the same procedure as for the HTTP proxy should be applied.

An HTTPS proxy is the central decision-making instance for the acceptance of certificates and largely takes over the control of the certificates from the users. For this reason, the settings of the HTTPS proxies are particularly important in terms of the approach regarding "problematic" certificates. The following table contains suggested settings for different cases:

Decision Suggested setting
Acceptance of certificates issued by a certificate authority. The certificate authorities listed in commonly used browsers are trustworthy. Here, it is assumed that the trustworthiness of the certificate authorities was checked by the browser manufacturer.Nevertheless, it should be regularly checked whether all certificate authorities are still trustworthy.If required, additional certificate authorities may be added. However, this must only be performed after having carefully checked the trustworthiness of the certificate authority.
Acceptance of certificates not issued by a certificate authority (self-signed certificates"). Self-signed certificates are exclusively intended for encryption purposes and do not offer any functions for securing the authenticity of a website.Such certificates should only be accepted in exceptional cases upon explicit examination.
Tunnelling of websites (i.e. these are characterised by end-to-end encryption). Tunnelling bypasses the process of filtering for malicious programs. Therefore, tunnelling should only be permitted as an exception if the other party is particularly trustworthy.
Acceptance of certificates where the "common name" of the certificate does not match the retrieved URL. If the common name of the certificate and the URL do not match, this is indicative of a manipulation in principle.Such certificates should not be accepted as a matter of principle.
Acceptance of certificates despite elapsed period of validity. Trustworthy websites are well administered and always have a valid certificate.Therefore, certificates with elapsed period of validity should not be accepted as a matter of principle.

Table: Suggested settings

SMTP

S 4.100 Security gateways and active content should also be taken into consideration in connection with SMTP (i.e. the email service).

Spam filters are integrated into different security proxies. However, the capabilities of these filters often fall short of the functionality of dedicated spam filters (i.e. stand-alone components). Consequently, integrating a dedicated spam filter into the security gateway often allows more efficient email filtering.

Currently, there are no procedures with the capability of differentiating "useful" emails from spam emails with certainty. Therefore, it is only recommendable to use a spam email filter if the list of deleted emails is habitually (as a rule, daily) checked by an employee for emails deleted accidentally (false positives).

Suggestions regarding the configuration and operation of the spam filter:

If no spam filter is integrated into the security gateway, the employees should be trained as to how to securely handle spam emails. Notes to the employees may include:

Filtering file extensions

The following file extensions are not required in the majority of work environments and may be filtered (ordered according to the type of basic threat):

Access to the entire system:

Execution of any applications:

Further problems:

This list is inevitably incomplete. There are many other file types that can be used to compromise a terminal device that are sometimes absolutely required for the workflow (e.g. .html, .xls, .pdf). Filtering files only based on file extensions or MIME types alone may not provide sufficient levels of security, since files with malicious programs are often equipped with harmless extensions and executed anyway.

Telnet

Telnet should only be used in exceptional cases and be replaced by a more secure protocol if possible, for example SSH. If it is nevertheless absolutely necessary to use TELNET, the ALG or the packet filter must be used in order to limit the permitted connections to the minimum extent.

FTP

Similarly to Telnet, FTP should also only be used in exceptional cases and the permitted connections must also be limited to the minimum extent with the help of corresponding filter rules or access control lists.

The following protocols should be filtered:

POP3

For POP3, S 4.100 Security gateways and active content should be taken into account.

Review questions: