• No results found

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

N/A
N/A
Protected

Academic year: 2021

Share "ArcGIS Server Security Threats & Best Practices David Cordes Michael Young"

Copied!
29
0
0

Loading.... (view fulltext now)

Full text

(1)

ArcGIS Server

Security Threats & Best Practices 2014

(2)

Introduction

Threats

Best practice

- ArcGIS Server settings - Infrastructure settings - Processes

Summary

(3)

Introduction

Application Security Risks

(4)

Threats

Standardized Vulnerability Ranking

Common Vulnerability Scoring

System (CVSS)

- Open and standardized method

for rating IT vulnerabilities

- Overall score based on input

from 3 scores - Base

- Temporal

(5)

Threats

Calculate Your Vulnerability Risk

NIST online calculator

for calculating

vulnerability risk

(6)

Attacks

Injection

What

- Tricking an application into including unintended commands in the data set to an

interpreter

Example

- Attacker sends attack in form data, such as ‘ or 1=1 - Application forwards attack to database in a SQL query

- Database runs modified query containing attack and sends results to app

Recommendations

(7)

Attacks

Cross-Site Scripting (XSS)

What

- Raw data from attacker is sent to an innocent user’s browser

Example

- Attacker sets trap by entering a malicious script into a web page that stores the data on the server - Victim views the page and the script runs inside the victim’s browser with full access to the DOM

and cookies

- Script silently sends attacker victim’s session cookie

Recommendations

(8)

Attacks

Security Misconfiguration

What

- Web applications rely on a secure foundation from OS up through Application Server

Example

- Install backdoor through missing OS or server patch

- Accidentally exposing ArcGIS Admin and Manager interfaces to Internet

Recommendations

- Ensure security patches in place – e.g. OpenSSL/Heartbleed - Utilize the ArcGIS Web Adaptor

(9)

Attacks

Sensitive Data Exposure

What

- Storing and transmitting sensitive data insecurely

Example

- Victim enters sensitive information in a form - Error handler logs sensitive info

- Logs accessible to all IT staff for debugging purposes providing opportunity for

malicious insider to review sensitive info

Recommendations

(10)

Attacks

Cross-Site Request Forgery (CSRF)

What

- Victim’s browser is tricked into issuing a command to a vulnerable web app

Example

- Attacker sets trap on a website or email – Hidden <img> tag contains attack against

vulnerable site

- While logged onto vulnerable site, victim views attackers site where the <img> tag is

loaded by browser, sending GET request (including credentials) to vulnerable site

- Vulnerable site sees legitimate request from victim and performs the action requested

Recommendations

(11)

Attacks

Using Components with Known Vulnerabilities

What

- Vulnerable components are common can be identified and exploited with automated tools

Example

- Vulnerable framework library incorporated as part of web application

- Developer does not know dependent component being used, let alone the version - Results in application weakness such as injection, broken access control, XSS

Recommendations

(12)

Attacks

Un-validated Redirects and Forwards

What

- Web application redirect includes user supplied parameters in the destination URL

and are not validated

Example

- Attacker sends attack to victims email/webpage

- Victim clicks link containing un-validated parameter and app redirects victim to

attacker’s site. Attackers site installs malware on victim system

Recommendations

(13)

Attacks

(14)
(15)

Disable the primary site administrator

Enterprise users?

Recommend: Disable the “Primary Site

Administrator” (PSA) account

(16)

Worried about token sniffing?

How do tokens work?

(17)

Disable Services Directory

What is services directory?

(18)

Limiting access to your web services

Which web apps can access

your services?

Default: Any

(19)

Preventing Injection and Spying

Use HTTPS for everything

(20)
(21)

Infrastructure Settings

1.

Firewall Ports

2.

Least privileges

(22)

Firewall ports

Product Port Purpose Who Accesses

Server 6080 Service Access Web Adaptor or Reverse Proxy Server 6443 Encrypted Access Web Adaptor or Reverse Proxy Portal 7080 Service Access Web Adaptor or Reverse Proxy Portal 7443 Encrypted Access Web Adaptor or Reverse Proxy Server 4000-4003 Internal

communications

(23)

Least privileges

10.0 and prior – admin required

10.1 and later – minimal privileges

Windows - run as a service.

(24)

Protect your config-store at all costs

config-store and directories must

be secured

Be paranoid – don’t even allow read

access

(25)
(26)

Simple processes go a long way….

1.

Monitor your logs

(27)

Monitor the logs

ArcGIS Server logs dodgy things….

Bad password attempts

Locked out accounts

(28)

Admin API (10.2+)

Review groups with publisher,

administrator privileges

(29)

References

Related documents

Critically, there is no capacity – or intent – for CRA to meet the full cost of rental (Australian Bureau of Statistics 2012). Cross-national comparisons of the effect of

(While mitigation principles do in some respects relate to causation, other issues are relevant as well and.. I have addressed them in detail under the topics of permanent

The brake torque and the brake specific fuel consumption were measured; the brake thermal efficiency was evaluated, as performance parameters, at 25 % of full

-15 0 15 30 45 60 Television Internet newspaper Thin newspaper &#34;Blick&#34; Voluminous newspaper &#34;NZZ&#34; ecopoints distribution credit disposal transport production

cover use for larger-scale muskmelon farmers. We examined 1) the impacts of row covers on insect and disease control and yield in organic and conventional crop management, and 2) the

(As noted, all the countries in this core calculation are either of French or British legal origins.) The coefficient on French legal origin suggests that switching a country from

Mean and standard deviation of the concentration of total protein (μg/μl) in the hemolymph of honey bees confined in plastic cages at emergence, after feeding on beebread

Here, we present a means to achieve this via application of windowed canonical correlation analysis (CCA) to source space projected MEG data. We describe generation of