Free Essay

Linux-Based Web Application Infrastructure Plan

In:

Submitted By Tigerman
Words 1306
Pages 6
Secure File Storage Server
First World Bank Savings and Loan has a need to deliver highly confidential customer data in PDF format for online customers. This can be done by uploading data to a Linux file server by bank employees within the LAN. This however is inaccessible for customers. First World Bank Savings and Loan has created a plan to make a secure web server so clients can access the data. In order to do this, we will set up a separate Linux virtual machine that will be running SFTP service that only works with a SSH connection. In order to connect with a SSH connection, users have to pre-authenticate through the web server and traffic needs to be forwarded from that web server to the SFTP server. The SFTP server will then take off the SSH “shell” and be able to read the SFTP traffic. In order to do this, we will implement MySecureShell software that will be installed on an Ubuntu release server. According to http://xmodulo.com/, MySecureShell is an OpenSSH server system that:
•Limit per-connection download/upload bandwidth
•Limit the number of concurrent connections per account
•Hide file and directory owner/group/rights
•Hide files and directories which user has no access to
•Limit the life time of a connection
•Chroot SFTP user into his/her home directory
Secure Web and Database Servers

Based on what is being asked I am recommending a database and Web server architecture along with this there will be explanations as to how they are secure and stable. It is important to have both a web server and database on a banks network in order to be able to do what is being required. A key part of having a web server and database server is how we choose to implement them. this can be done many ways but we will need to explore our options to ensure we chose the correct option, the reason for this being if the implementation process is not done correctly our network and information may be vulnerable.
We chose to go with Apache HTTP Server, looking at Apache HTTP server here is some background information on it. It was a project to develop and maintain an open- source HTTP server for modern operation systems. These systems include Unix and Windows NT. Apache HTTP web server is the most popular open source web server available being used at 60% over all other web servers. We chose to go with MySQL for our database server primarily for security reasons and because of the ability to expand our business in the future. Due to the fact that we are a bank and deal with very sensitive information we will be taking many precautions to ensure that our servers are protected. So first we want to ensure that we separate the web server from the database server and have them on two different physical servers. With this being said the web server will have to authenticate with the database server. MySQL can be protected with password verification, this way if the web server is compromised they cannot touch the database server and if the physical database server is compromised they cannot reach MySQL. These will be some of the steps taken to secure the database server. When it comes to protecting our web server you will want to remove all unnecessary plugins and update CMS, you will also want to ensure that apache is not running as root. You want to make sure you want to remove any network services that will not be used on the web server like print services along with RAS.
Now we have to make sure we select a secure way to have administrators be able to remote access the servers. We must ensure that remote access is secured properly, this can be obtained by using encryption protocols and tunneling. You can also use security tokens paired with single sign on. This should be restricted to a limited amount of accounts.

Provide Layered Security
Layer One: Firewall Configuration In order to configure the firewall settings for the web server, iptables will be used. This will allow a configuration that greatly controls what type of traffic can enter the web server. The rules of the iptables configuration for acceptance and rejection will be as follows:

-A FWBSL-Firewall-1-INPUT –m state --state NEW –m tcp –p tcp --dport 22 –j ACCEPT -A FWBSL-Firewall-1-INPUT –m state --state NEW –m tcp –p tcp –dport 443 –j ACCEPT
-A FWBSL-Firewall-1-INPUT –j REJECT --reject-with icmp-host-prohibited

These inputs will allow for SSH traffic (for approved administrators to access the web server over the internet) and HTTPS (Hypertext Transfer Protocol over TLS/SSL). All other traffic will be rejected.

Layer Two: TCP Wrappers TCP wrappers will be employed to “wrap” any services and filter them through the protection employed in the /etc/hosts.allow and /etc/hosts.deny files. It is important to note that the allow file is checked before the deny file. Initial configuration of these files will include placing more restrictive rules in the /etc/hosts.deny file first. This will deny all access to TCP Wrapper protected services that is not specified in the allow file. The allow file will feature additions that explicitly allow certain users (such as the web server administrator) access to the services they will need. Services that should be configured for use with TCP Wrappers can be found in the /etc/inetd.conf and /etc/xinetd.conf files. Certain services must be explicitely added to TCP Wrappers such as SSH by using the ldd command (such as ldd /usr/sbin/sshd). This particular command will be used for layered security of SSH. The layered security that TCP Wrappers provides can also be used to deny specific IP addresses, users, or domains. Any known malicious domains will be added to /etc/hosts.deny. Furthermore, the /etc/hosts.allow file should be configured with exceptions to allowed subnets by specific IP address by using the EXCEPT command.

Layer Three: SELinux SELinux only supplies a security layer if it is turned on. To enable SELinux (after the initial server configuration, since SELinux could causes problems with installation). To turn on SELinux, the /etc/selinux/config file must be accessed and SELinux must be set to Enforced. Once SELinux is turned on, it can be configured just as other security measures. Best practices state that initial configuration should begin with a denial of all actions. From that point users, applications, and services can be allowed to function within desired parameters by being allowed access to necessary configuration files and program libraries. For the web server, the web administrator will be given specific access to configuration files which are necessary and users placed in the customer database will be given access to their specific data. All other access should be restricted by SELinux.

Conclusion: With these three layers in place, the web server for First World Bank Savings and Loan will have maximum protection against unauthorized users. In case of a breach in one layer, another layer should act as a stop-gap. An example of this would be if someone found a way to use port 23 to create an SSH connection in, TCP Wrappers would then check their username against the /etc/hosts.allow and /etc/hosts.deny lists (since SSH is set up to use TCP Wrappers) to determine if that user can continue. Even if the person find their way onto the allow list, they will then be checked by SELinux whenever trying to perform an action with a configuration file or program library to see if they’re approved to commit such an action. With all of these layers combined, security has become much more robust.

Similar Documents

Premium Essay

Blah

...grid computing. It has been one of the most hot research topics. Now many corporations have involved in the cloud computing related techniques and many cloud computing platforms have been put forward. This is a favorable situation to study and application of cloud computing related techniques. Though interesting, there are also some problems for so many flatforms. For to a novice or user with little knowledge about cloud computing, it is still very hard to make a reasonable choice. What differences are there for different cloud computing platforms and what characteristics and advantages each has? To answer these problems, the characteristics, architectures and applications of several popular cloud computing platforms are analyzed and discussed in detail. From the comparison of these platforms, users can better understand the different cloud platforms and more reasonablely choose what they want. Keywords-cloud computing; virtualization; utility computing; IaaS; PaaS; SaaS I. INTRODUCTION Cloud computing is complete new technique put forward from industry circle, it is the development of parallel computing, distributed computing and grid computing, and is the combination and evolution of virtualization, utility computing, Infrastructure-as-a-Service (IaaS), Platform-as-aService (PaaS) and...

Words: 3393 - Pages: 14

Free Essay

Its-325 Linux

...services that meet required regulations, and provide use of credit cards and loan application in a Linux / open source infrastructure.  Point out specific legislation and regulations that meet the statutory compliance criteria. The proposed plan would have to meet PCI / SOX / and GLBA regulations. For PCI compliance we would need to conduct an annual risk assessment using a SAQ (self-assessment questionnaire), and conduct quarterly PCI scans using an approved vendor. If our business grew to 6 million transactions per year, we would need to conduct an annual internal audit, in addition to the PCI scans. Some of the basics for PCI functionality includes, network hardening on web applications to protect cardholder data, including (but not excluded to) password policy enforcement, encryption, maintaining secure systems, keeping systems up to date on anti-virus, restricting business access to cardholder data, restricting physical access to data, tracking and monitoring access to all network resources, regular tests on security. If our web applications evolved into more services such as shareholder infrastructure, we would need to delve into the SOX regulations. Because we are offering loan services, we would need to abide by the Gramm Leach Bliley Act rules. Some of this would involve privacy notices about how we divulge their data.  Assess the feasibility of Linux and open source infrastructure in handling security demands listed by the legislation and regulations. The...

Words: 1024 - Pages: 5

Premium Essay

Biography

...Systems Design What is a System? Give examples. A set of components working together for a common objective Information Systems (Web-based) H/w, S/W, people, Data, Procedures, Web-portals What is SDLC? Systems Planning, Systems analysis, systems design, systems development, implementation, maintenance IS alignment IS Success IS usage User satisfaction Information waste IS enabled Competitive advantage Orgl change Orgl learning TAM Easy to use Perceived personal usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner, Amazon.com, Dell.com – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case...

Words: 1598 - Pages: 7

Premium Essay

Linux Security

...Securing Linux Platforms and Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperative due to an estimated revenue of $100,0000,000 flowing in by virtue of online credit card transactions specific to banking and loan application based services. This security policy will go on to outline the specific regulations and legislation that are in agreement with the statutory compliance criteria. Below is a recommended view of the characteristics and components of the recommended security based policy. Taking up the stake of the performance, cost, and security of maintaining the Linux, and open source infrastructure will be within the premise of the defined roles and responsibilities. Annual cost savings are estimated to amount to $4,000,000 (approx) by virtue of implementation of this solution. The ‘C’-‘I’-‘A’ triad will be a crucial requirement fo the First World Savings Bank and translates to Confidentiality, Integrity and Availability respectively. Confidentiality aspect with reference to First World Savings Bank – Confidentiality refers to the principle that states...

Words: 3404 - Pages: 14

Premium Essay

Project Part 1 Task 1: Outline Security Policy Scenario

...online use of credit cards for loan applications. The organization estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services. A task team has been formed to study the cost, performance, and security of maintaining a Linux and open source infrastructure. According to rough estimates, annual cost savings in licensing fees alone can be up to $4,000,000. At the same time, the confidentiality, integrity, and availability (CIA) triad perspective needs to be taken into account for infrastructure maintenance. The task team has engaged a network engineer with the network and routing design. The team has determined the following server services that would be needed to support the online transaction infrastructure: * A database server * A Web server * A file server * A Simple Mail Transfer Protocol (SMTP) server * A Lightweight Directory Access Protocol (LDAP) server All servers would be physically located in a third-party data center. Tasks You need to: Understand the business need of First World Bank Savings and Loan. Point out specific legislation and regulations that meet the statutory compliance criteria. Assess the feasibility of Linux and open source infrastructure in handling security demands listed by the legislation and regulations. Make recommendations to model a tiered architecture for the proposed online transaction in a Linux-based infrastructure. Identify a suitable security framework...

Words: 780 - Pages: 4

Premium Essay

Operating System Analysis Paper

...Operating System Analysis Paper Team A: , POS/355 August 25, 2012 Demetrius Fluker University of Phoenix Operating System Analysis Paper When ruminating over which operating system for a home, business, or office computer or network of computers, it is vital to evaluate all areas of the different operating systems options. The key system options to compare and contrast when evaluating Microsoft Windows XP, Microsoft Windows Server 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same. These requirements are a PC with a 233 megahertz or higher (a 300 megahertz + processor speed is recommended), 64 megabytes (MB) of RAM or higher (128 MB is recommended), 1.5 gigabytes (GB) of available hard drive space, a video adapter and monitor that is Super VGA (800x600) or higher-resolution, CD/DVD-ROM drive, keyboard, and mouse/pointing device. The Windows XP Starter Edition has different system requirements. These are 233MHz processor or better, 256 MB of RAM, Super VGA (800x600) video adapter and monitor, CD/DVD-ROM drive, keyboard, mouse/pointing device, DirectX 9 graphics with 32 MB...

Words: 4101 - Pages: 17

Free Essay

Marketing

...None CREDIT HOURS : 3 SEMESTER : January - April LECTURER : Azmir Ismail E-MAIL : azmir@ucsiuniversity.edu.my TUTORIAL 3 Chapter 3 – IT Infrastructure and Emerging Technologies TRUE or FALSE 1. A primary example of centralized processing is client/server computing. TRUE or FALSE 2. In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers. TRUE or FALSE 3. IT infrastructure consists of just those physical computing devices required to operate the enterprise. TRUE or FALSE 4. An application server may reside on the same computer as a Web server or on its own dedicated computer. TRUE or FALSE 5. The decision to outsource software development is also referred to as the rent-versus-buy decision. TRUE or FALSE 6. In green computing, reducing computer power consumption is a top priority. TRUE or FALSE 7. Autonomic computing is implemented primarily with enterprise or ISP servers. TRUE or FALSE 8. Whereas XML is limited to describing how data should be presented in the form of Web pages, HTML can perform presentation, communication, and data storage tasks. TRUE or FALSE 9. The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture. TRUE or FALSE 10....

Words: 817 - Pages: 4

Free Essay

Chapter 6 Foundations of Business Intelligence: Database and Information Management

...Chapter  5   IT  Infrastructure  and  Emerging  Technologies     IT  Infrastructure   • Shared  technology  resources  providing  platform  for  specific  IS  applications   • Investment  in  hardware,  software,  services  (consulting,  education,  training)   • Foundation  for  serving  customers,  working  with  vendors,  managing  business   process   • Set  of  physical  devices  and  software  required  to  operate  enterprise   • Set  of  firmwide  services   o Computing  platforms  providing  computing  services  (e.g  desktop   computer,  laptop)   o Telecommunications  services   o Data  management  services  (+analyzing)   o Application  software  services  (ERP,  CRM,  SCM,  KMS)   o Physical  facilities  management  services   o IT  management  (plan  infrastr.  Coordinate  with  BU),  standards  (policies),   education  (training)  ,  research  and  development  services  (future   investments)   • “Service  platform”  perspective  more  accurate  view  of  value  of  investments     Evolution  of  IT  Infrastructure   • General-­‐purpose  mainframe  &  minicomputer  era:  1959  to  present ...

Words: 3490 - Pages: 14

Premium Essay

Analysis and Research for the Decision Making Process

...this organization. If this merger is to succeed, the organization needs to have a firm organizational strategic plan that will combine the strategies of both companies. The strategy will include how every person involved, in both organizations, will be affected, how the different platforms will work, and how these platforms can be brought together in order to reach our organization’s goals and objectives for future success. Additionally, the organization needs to have a decision processing system that will support the organization’s business processes, activities and tasks, how input and output data flows, business applications, and the organization’s technology infrastructure. In order to achieve this, the business objectives need to be defined, business workflow needs to be developed, development of system requirements, specification of the applications and data architectures, define information infrastructure, define information system program measures and metrics, and manage hardware and software integration. Three Characteristics of Enterprise Architecture Enterprise architecture is defined as the goals of the organization, how these goals will be realized from the business processes, and how these “business processes can be better served through technology” (Sessions, 2006). “These systems are broken down into subsystems and connected to each other based on the relationship between them. The relationships and with external environment, users, guidelines, terminology...

Words: 1430 - Pages: 6

Premium Essay

Linux vs Windows

...Windows vs. Linux Enterprise Distribution Recommendation Introduction to UNIX Linux vs. Windows Enterprise Distribution Recommendation X Industries is a large sized business that is in the midst of a decision regarding wither or not to switch their existing Windows-based IT system over to a less proprietary product, Linux. This is no easy choice to make, considering X Industries is currently running 170+ Windows-based servers of various types. Their staff fulfills company operations on these servers with their 750+ array of desktop and laptop computers – all running Windows XP Professional. Linux may just be a little dog in the Microsoft park, but a company that makes the big switch can expect Linux to yield benefits in cost savings, increased security, and arguably better usability. However, each individual enterprise situation is always different, so a cookie cutter solution of which system to use will never suffice. Rather, the numbers through subjects of cost, market share, programming capabilities, software compatibility and availability, and the ever-important user interface will tell the best choice. Cost The only way to evaluate cost is to get down to the basics, and look at the statistics. The first topic of cost will center solely on the price for Windows operating system software, first for the network side, then the node side. Other topics will focus on the cost of the Ubuntu Linux distribution, which will run on the servers and desktops,...

Words: 3478 - Pages: 14

Premium Essay

Pookie

...Chapter 5 IT Infrastructure and Emerging Technologies As information becomes a valuable resource of a digital firm, the infrastructure used to care for it takes on added importance. We’ll examine all of the components that comprise today’s and tomorrow’s IT infrastructure and how best to manage it. 5.1 IT Infrastructure When you mention the phrase “information technology infrastructure,” most people immediately think of just hardware and software. However, there is more to it than just those two. In fact, the most important and often most-ignored component is that of services. Integrating all three components forces a business to think in terms of the value of the whole and not just the parts. Including all three components in any discussion of IT infrastructure truly fits the cliché that the whole is greater than the sum of its parts. Defining IT Infrastructure If you define a firm’s IT infrastructure in terms of technology you limit the discussion to the hardware and software components. By broadening the definition to that of service-based, you are then bringing into the discussion the services generated by the first two components. Also, you are including the persware element that we discussed in Chapter 1. As technology advances the types of hardware and software available, it becomes more critical for the firm to focus on the services that a firm can provide to its customers, suppliers, employees, and business partners. To round out the list of IT infrastructure components...

Words: 8576 - Pages: 35

Premium Essay

It255

...System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ...

Words: 4114 - Pages: 17

Free Essay

Rhel Licensing

...enterprise LinuX subscription Guide subscription Guide Table of ConTenTs Introduction How IT organizations benefit from subscriptions What is included in your Red Hat subscription? Support for the production environment Subscription packaging model Assembling your subscription order Sample worksheet 1: Provisioning physical servers Sample worksheet 2: Adding guests to a virtual environment Sample worksheet 3: Setting up a virtual environment Subscription scenarios and recommendations Physical production environment Sample worksheet 4: Setting up a physical, mission-critical production environment Virtual production environment Sample worksheet 5: Calculating subscriptions for guests Sample worksheet 6: Calculating subscriptions for Red Hat Enterprise Linux on virtual environments Open hybrid cloud Sample worksheet 7: Calculating subscriptions for a private cloud Public cloud access subscriptions Sample worksheet 8: Calculating subscriptions for a public cloud Disaster recovery Development environment Desktops and workstations Managing subscriptions Renewing subscriptions Subscription terms facebook.com/redhatinc @redhatnews linkedin.com/company/red-hat 2 3 3 5 6 8 9 9 9 10 10 11 11 12 13 13 14 14 14 14 15 15 16 17 17 redhat.com System coverage Support services levels Proper use of subscriptions and services Next steps Registering on the Red Hat Customer Portal Activating subscriptions Downloading software Entitling subscriptions Red Hat Enterprise Linux products ...

Words: 8641 - Pages: 35

Free Essay

Open Source

...providing me the opportunity to complete this project and handed me an experience and exposure which will help me endeavors of professional career. Without her help and guidance, completion of this project wouldn’t have been possible. I would take this opportunity to extend my humble and grateful thanks to all those people who have directly and indirectly helped me to complete this project. ABSTRACT ABSTRACT There is no doubt that without computers to flourish in this competitive world is not possible. As days passes by our dependency on these systems in increasing spirally. IT-infrastructure is becoming more advanced & complex day by day. With the dependency on IT the important concerns that have risen are the security & cost of the IT-infrastructure & data. This project has tried to understand the various difficulties faced in IT & the...

Words: 1969 - Pages: 8

Premium Essay

Seeking Help

...information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18