Security Baseline For Web Hosting
Security Baseline For Web Hosting
ABSTRACT A “Security Baseline” defines a set of basic security objectives which must
be met by any given service or system. The objectives are chosen to be pragmatic and
complete, and do not impose technical means. Therefore, details on how these security
objectives are fulfilled by a particular service/system must be documented in a separate
“Security Implementation Document” [1]. These details depend on the operational
environment a service/system is deployed into, and might, thus, creatively use and
apply any relevant security measure. Derogations from the baseline are possible and
expected, and must be explicitly marked.
This document describes the Security Baseline for Web Hosting services used in CERN
production environment.
Distribution: Unrestricted
Document
History of Changes
The objectives of the Security Baselines below apply to any server, PC, laptop (commonly
denoted within this document as “server”). If a service/system consists of multiple servers, the
baseline applies to each of them. The terminology follows RFC2119 [2]. The words “least”,
“minimize”, “restrict” and “small” refer to the operative minimum before rendering the
service/system useless.
1.2 PROVISIONING
Ref. Requirement Comment
WEB‐PRV‐1 Make all Web sites static by default.
WEB‐PRV‐2 Reduce the number of programming platforms and libraries This reduces the maintenance
provisioned for Web applications to an operational minimum. overhead and the attack surface.
WEB‐PRV‐3 Configure the programming platforms and libraries
provisioned for Web applications securely.
WEB‐PRV‐4 Ensure that all installed programming platforms and libraries
provisioned for Web applications are kept up‐to‐date.
WEB‐PRV‐5 Document publicly the programming platforms and libraries
provisioned for Web applications as defined in WEB‐PRV‐2.
WEB‐PRV‐6 Compartmentalize the hosting service in order to separate This avoids that a compromize of a
multiple Web sites hosted on a single server or service. single Web site affects other sites.
WEB‐PRV‐7 Verify regularly that every hosted Web site has an owner. For
Web sites without an owner, a new owner (e.g. from the line
hierarchy) must be identified. The meaning of “regularly”
must be explicitly defined.
2. REFERENCES
[1] The CERN Security Team, “Security Implementation (Template)”, EDMS 1062504
[2] Network Working Group, RFC2119, http://www.ietf.org/rfc/rfc2119.txt
[3] IT/OIS, “Identity Management”, http://cern.ch/identitymanagement
Document
[4] The CERN Security Team, “Security Baseline for Servers”, EDMS 1062500