Solved

best practice secure web application on server

Posted on 2013-05-20
3
344 Views
Last Modified: 2013-07-30
I am setting up a server for a web application. The server will sit inside our private network but will need to be accessible from outside our firewall with out using a vpn client. What can I do to make sure the server is secure. I will open up port 80 only to the server on the firewall. Anything other advice.

Thanks
0
Comment
Question by:paul_techy
3 Comments
 
LVL 4

Accepted Solution

by:
bepsoccer1 earned 167 total points
ID: 39181860
You are correct, just ensure only port 80 is open on the firewall for the web server.  Though, for stronger security you might add SSL/force SSL then you would also, need to open port 443.
0
 
LVL 28

Assisted Solution

by:asavener
asavener earned 167 total points
ID: 39182076
Best practice is to put the web server in a separate (DMZ) subnet from your internal network.

Make absolutely sure that your web server (always!) has all of the latest security patches.  Make absolutely sure that you follow best practices for securing the particular web platform you're using.  (Such as removing sample scripts, only enabling needed services, etc.)
0
 
LVL 3

Assisted Solution

by:ajmehta
ajmehta earned 166 total points
ID: 39182190
If you know the inbound IP addresses (not dynamic), I would highly suggest limiting connections to those IPs
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question