?
Solved

best practice secure web application on server

Posted on 2013-05-20
3
Medium Priority
?
359 Views
Last Modified: 2013-07-30
I am setting up a server for a web application. The server will sit inside our private network but will need to be accessible from outside our firewall with out using a vpn client. What can I do to make sure the server is secure. I will open up port 80 only to the server on the firewall. Anything other advice.

Thanks
0
Comment
Question by:paul_techy
3 Comments
 
LVL 4

Accepted Solution

by:
bepsoccer1 earned 668 total points
ID: 39181860
You are correct, just ensure only port 80 is open on the firewall for the web server.  Though, for stronger security you might add SSL/force SSL then you would also, need to open port 443.
0
 
LVL 28

Assisted Solution

by:asavener
asavener earned 668 total points
ID: 39182076
Best practice is to put the web server in a separate (DMZ) subnet from your internal network.

Make absolutely sure that your web server (always!) has all of the latest security patches.  Make absolutely sure that you follow best practices for securing the particular web platform you're using.  (Such as removing sample scripts, only enabling needed services, etc.)
0
 
LVL 3

Assisted Solution

by:ajmehta
ajmehta earned 664 total points
ID: 39182190
If you know the inbound IP addresses (not dynamic), I would highly suggest limiting connections to those IPs
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering cloud tradeoffs and determining the right mix for your organization.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Suggested Courses
Course of the Month15 days, 10 hours left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question