Page 80 - GiGW3
P. 80

5. Guidelines









                                                                                                                                                                    data loss of the organisations or users.                                                                                                                                                                                                                                                                               (iv)    Acces

                                                                                                                                                                    The government organisation will ensure and monitor that the host                                                                                                                                                                                                                                                      (v)    Crypto
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           (vi)    Error
                                                                                                                                                                    service provider and the developer adhere to the industry best                                                                                                                                                                                                                                                         (vii)    Data

                                                                                                                                                                    security practices and guidelines such as ISO 27001, OWASP ASVS,                                                                                                                                                                                                                                                       (viii)    Com

                                                                                                                                                                    OWASP  Top  10  vulnerabilities  and  CIS  benchmarks  as  per  the                                                                                                                                                                                                                                                    (ix)    Syste
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            (x)    Datab
                                                                                                                                                                    prevailing security policy. Following guidelines are to secure web
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            (xi)    File
                                                                                                                                                                    resources & associated infrastructure:                                                                                                                                                                                                                                                                                  (xii)    Mem

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (n)     Implement logg

                                                                                                                                                                    Statement: Website, web application, web portal or mobile app                                                                                                                                                                                                                                                 (o)     Configure websi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (p)     Sanitise user
                                                                                                                                                                    have been Security Audited and an Audit Clearance certificate has                                                                                                                                                                                                                                              a semantic approach.
                                                                                                                                                                    been issued by NIC/ STQC/ STQC empanelled laboratory/CERT                                                                                                                                                                                                                                                     (q)     The technology

                                                                                                                                                                    -In empanelled laboratory before hosting in production                                                                                                                                                                                                                                                        client-side  Active  C
             Cybersecurity                                                                                5.3                                                       environment.                                                                                                                                                                                                                                                                                                  strengths and weakness


                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (r)     Disable the ro

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (s)        Use  explic
            P           changes, destruction, or disruption is generally termed as                                                                                  Benefits: The goal of securing a website, web application, web portal or mobile app is to maintain                                                                                                                                                                                                             environment value.
                        Protecting  web  resources  from unauthorised  use, access,
                                                                                                                                                                    the confidentiality, integrity and availability of information and services. This goal is accomplished

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  B.     Securing databa
                                                                                                                                                                    through the implementation of best security practices in design, development and deployment.

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  used to store large am
                        “Website Security” or “Secured Website”.
                                                                                                                                                                    Attacks could cause both personal embarrassment and financial risks.
                                                                                                                                                                    Government organisation action: It should be ensured that the website, web application, web                                                                                                                                                                                                                   technical controls sho
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  The following are the
                                                                                                                                                                    portal  or  mobile  app  don’t  have  any  security  risks  as  identified  by  the  latest  OWASP  Top  10
             Sometimes           web        resources         become          unavailable          due       to                                                     vulnerability list. The design and development agency or the developers should follow industry                                                                                                                                                                                                                (a)     Implement stro
             denial-of-service  attacks  or  display  modified  information  on  the                                                                                 best practices such as OWASP ASVS and OWASP MAVS.                                                                                                                                                                                                                                                             rest and transit.

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (b)     Implement stro
             webpages. Millions of passwords, email addresses and credit card                                                                                       Developer action: Securing critical web resources is more important than ever as the focus of                                                                                                                                                                                                                 (c)    Use  secure  cr
                                                                                                                                                                    attackers has steadily moved towards the application layer and they are exploiting the weaknesses
             details have been leaked into the public domain exposing web users                                                                                                                                                                                                                                                                                                                                                                                                   administrative passwor
                                                                                                                                                                    in the code.
             to both personal embarrassment and financial risks. The purpose of                                                                                                                                                                                                                                                                                                                                                                                                    (d)     Utilise strong
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (e)    Disable unneces
             Website Security is to prevent such risks.                                                                                                             A. Securing Code                                                                                                                                                                                                                                                                                              service accounts.

             Website Security requires vigilance in all aspects starting from                                                                                       (a)     Ensure that all websites, web applications, web portals or mobile apps and their respective                                                                                                                                                                                                           (f)     Enable access
                                                                                                                                                                    CMS, 3rd party plugins, codes, etc.  are updated to the latest vers ions.
             design,  coding  and  implementation  to  testing  and  deployment.                                                                                           Note: Every day, there are countless websites/apps compromised due to outdated software.                                                                                                                                                                                                               not be assigned public

             Organisations should implement appropriate security majors,                                                                                                  Potential hackers and bots are scanning websites/apps to attack. Updates are vital to the                                                                                                                                                                                                               (g)   TLS should be en
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  databases.
             defences and countermeasures to protect web resources against                                                                                                 health  and  security  of  the  website/app.  If  the  website’s  software  or  applications  are  not                                                                                                                                                                                                 (h)     Create admin r

             malfunctioning, phishing, cyber-crimes or cyberattacks to avoid                                                                                              up-to-date, the website/app is not secure. Take all software and plugin update requests                                                                                                                                                                                                                 database.
                                                                                                                                                                           seriously. Updates often contain security enhancements and vulnerability repairs. Check the
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  (i)     The applicatio
                                                             80
   75   76   77   78   79   80   81   82   83   84   85