123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

The Process: Designing Security For Iis

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

IIS 6.0 is installed in a locked-down fashion. With this version of microsoft exams(http://www.mcsa-70-270.com)
, many security issues will be based around deciding what services, components, and configuration need to be done to enable an application to run or to create a useful Web site that fits a business need. In the rush to "just get it to work," services might be started and com-ponents might be added that are not needed.
Your job as a designer is not only to design security controls that need to be put into place but to ensure that the security that is already established is not modified without reason, One way to enforce this process is to design a security baseline for IIS that meets business needs and then require that any change to that baseline meet stringent requirements for security and business needs. To design security for IIS that meets business needs, follow these steps:
1. Understand the business needs. Do not design security in a vacuum. The first step is to understand the business needs. Remember that one of these needs, however, is to provide a Web server that has security that cannot ...
... be breached. Each section of this lesson and Lesson 2 provides explicit suggestions for how the dual requirements of meeting business needs and providing a secure Web server and sites can be met.
2.Design a reduced attack surface for the Web server. Harden the server running Windows Server 2003. Examine the default security of IIS, and select services and components that need to be enabled or implemented. Know what exists by default for both the Web server and for Windows Server 2003.
3.Design isolation and control for access to Webservers, Websites, applications, and server resources. Use ACLs and identities to isolate Web sites and protect server resources. Isolate applications in MCP certification(http://www.mcsa-70-270.com)
application pools. Application pools are a group of Web sites and applications that can use the same worker process. Each application pool serves as an isolation boundary—an application running outside of the application pool has no access to the processes or Web site running inside the application pool.
4.Design authentication for the needs of the Web site. Enable only the authentication types necessary. The design of authentication for IIS is taught in Lesson 2 of thi chapter.
5.Design how data will be protected in transit. Protect sensitive data—such as logon credentials, user identities, and credit card numbers—while it is in transit. Protect data transported between IIS and database servers.
6.Design a secure content management strategy. Provide a secure process for managing Web site content. Only authorized people should be able to add, change, or remove content.
7.Design monitoring and maintenance strategies for US. Design monitoring for security issues, performance issues, and reliability issues. Design a patching and updating process. Design remote administration.
8.Design security for databases used by Web sites and applications. Databases provide storage for and process data used in Web applications. Securing this data is often an exercise in securing the database.
9.Configure Web servers to isolate Web site and applications. Many Web Servers host more than one Web site, and many sites host many applications. Keeping sites and applications isolated from MCITP study guides free download(http://www.examshots.com/certification/MCITP:-Server-Administrator-36.html)
one another is an essential security technique.

Total Views: 263Word Count: 530See All articles From Author

Add Comment

System/Network Administration Articles

1. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services

2. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan

3. Know About The Fiber Optic Cabling Solutions
Author: Ryan

4. Choosing The Perfect Cat6a Cable For Your 10g Networks
Author: Ryan

5. Pm Plc Splitter: Boost Efficiency Of Optical Network
Author: Ryan

6. Integrated Circuit Packaging Has Ic Substrate As Its Foundation
Author: Ryan

7. Boc Package Substrate: The Pillar Of Semiconductor Packaging
Author: Ryan

8. What Are The Leading Brands Or Manufacturers Of Growing Rack Systems?
Author: doris zhang

9. Polarization Maintaining Fiber Coupler: A Basic High Precision Fiber Sensor Component
Author: Ryan

10. Know About The Optical Circulator In Optical Communication
Author: Ryan

11. Optical Fiber Alignment System And Optical Waveguide Alignment System
Author: Ryan

12. Why Smoad Networks Is The Best Choice For Sim-based Wifi Routers
Author: HubraSEO

13. The Value Of Canada Ul Pcbs: Ensuring Safety And Compliance
Author: Ryan

14. Sap And Msap In Flexible Circuit Fabrication
Author: Ryan

15. Get Deeper Into The Insights Of Aluminum Nitride Pcb (aln Pcb)
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: