Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

DEPLOYING PHIXFLOW FOR WEB B AND MOBILE ACCESS
PhixFlow 7.0
16 September 2016
Image Removed!worddav348d3085035cf3d99341a92e32d0d000.png|height=150,width=900!Table of contents

Anchor
_Toc505754055
_Toc505754055
Anchor
_Toc508076427
_Toc508076427
Anchor
_Ref509122098
_Ref509122098
Anchor
_Ref509122107
_Ref509122107
Anchor
_Ref509122113
_Ref509122113
Anchor
_Ref509122119
_Ref509122119
Anchor
_Ref509123051
_Ref509123051
Anchor
_Ref509123401
_Ref509123401

1 Introduction
2 PhixFlow security design features
2.1 Secure coding
2.2 Secure authentication
2.3 Authorisation
2.4 Access to other data
2.5 Separation of test data
2.6 Logging & audits
3 Deploying PhixFlow for web access
3.1 Introduction
3.2 Risk Assessments
3.3 Deployment Options
3.4 Deploying via VPN
3.5 Deploying using a DMZ or Screened Subnet
3.5.1 Hardening
3.5.2 Install an X509 Certificate to provide encryption
3.5.3 Configure firewall to allow access to the internal network
3.5.4 Configure firewall to allow access to the internet
3.5.5 General recommendations for using PhixFlow securely
3.6 Intrusion Detection & Prevention (ID/IP)
3.6.1 Patching and Monitoring
4 Deploying PhixFlow for Mobile Access
4.1.1 Centrally managed mobile devices
4.1.2 Auto-lock / PIN unlock
4.1.3 Restrict use in public places
4.1.4 Review read only access
Change History

Version

Date

Author/Approver

Description

1

12-Sep-16

Craig Strangwick

Initial public version.

2

16-Sep-16

Andy Humphries

Approved version

 

 

 

 

 

 

 

 










References
Other PhixFlow sources which may be referenced are:

  1. PhixFlow online help


Anchor
_Toc145416157
_Toc145416157
Anchor
_Toc229386997
_Toc229386997
Anchor
_Toc461783722
_Toc461783722
Introduction

...

The following architectures are commonly used by operators of remote access business applications when a VPN is not appropriate:

DMZ using two firewalls
This is most secure and often uses firewalls from 2 different vendors

Screened sub-net using a tri-homed firewall

Anchor
_Toc461558690
_Toc461558690
Anchor
_Toc461783736
_Toc461783736
Hardening

The following table lists the areas that require hardening and recommendations

Area to Harden

Recommendations

Operating Systems

Refer to the PhixFlow system planning guide and Vendor recommendations

Apache Tomcat application server

Refer to the PhixFlow system planning guide and vendor recommendations

PhixFlow Database server

Refer to the PhixFlow system planning guide and database vendor recommendations

PhixFlow Application

Refer to the PhixFlow Installation guide for installation with least-privilege access and removal of installation files and users.

PhixFlow Solutions Configuration

Review the permissions implemented on any applications.
Audit users and remove any that no longer require access.
Ensure a strong password policy used.


Anchor
_Toc461558692
_Toc461558692
Anchor
_Toc461783737
_Toc461783737
Install an X509 Certificate to provide encryption

...

If your company currently uses intrusion detection monitoring tools, the following information may be helpful.

Whitelist/Blacklist

Pattern

Description

Blacklist

.php, .exe, .asp, .aspx,

PhixFlow does not use any of these file extensions

Blacklist

..\ – <! </script>

Requests with these character combinations are not required

Whitelist

? & :

PhixFlow uses these characters in the URL

Anchor
_Toc461558694
_Toc461558694
Anchor
_Toc461783742
_Toc461783742
Patching and Monitoring

To protect PhixFlow from security vulnerabilities we recommend a best practice approach is used to identify assess and apply operating system and web application server security updates as soon as possible.
You should also ensure clients operating systems and browsers also deploy security updates as soon as possible, if possible using automatic updates for high priority security vulnerabilities.
Audit PhixFlow user accounts regularly, checking for accounts that are no longer needed or not being used and disable or remove them.

Anchor
_Toc461783743
_Toc461783743
Deploying PhixFlow for Mobile Access

...

When data does need to be entered or viewed in public places, we recommend that customers review screens, process and access controls to reduce the volume of data.