<section title="14.3. Web Applications"><subsection title="Objective"><paragraph
    title="14.3.1."


><![CDATA[<p>Access to Web content is implemented in a secure and accountable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="14.3.2."


><![CDATA[<p>This section covers information on Web browsers, plug-ins and active content including the development and implementation of appropriate use policies. </p>]]></paragraph>
<paragraph
    title="14.3.3."


><![CDATA[<p>The requirements in this section apply equally to the Web accessed via the Internet as well as websites accessed on an agency intranet.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="14.3.4."


><![CDATA[<p>An example of open source software&nbsp;that manages allow lists for client-side JavaScript controls is available at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>NoScript Firefox extension</strong></td>
<td style="text-align: center;">Inform Action</td>
<td>
<p><a rel="noopener noreferrer" href="https://noscript.net/" target="_blank">https://noscript.net/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Web usage policy"><paragraph
    title="14.3.5.R.01."

    tags="Governance,Information Security Documentation,Software Security,Web Applications"


><![CDATA[<p>If agencies allow system users to access the Web they will need to define the extent of Web access that is granted. This can be achieved through the development, and awareness raising amongst system users, of a Web usage policy.</p>]]></paragraph>
<paragraph
    title="14.3.5.C.01."

    tags="Governance,Information Security Documentation,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Must"
    cid="1272"
><![CDATA[<p>Agencies MUST develop and implement a policy governing appropriate Web usage.</p>]]></paragraph>
</block>
<block title="Web proxy"><paragraph
    title="14.3.6.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Web proxies provide valuable information in determining if malicious code is performing regular interactions over Web traffic. Web proxies also provide usable information if system users are violating agency Web usage policies.</p>]]></paragraph>
<paragraph
    title="14.3.6.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1592"
><![CDATA[<p>Agencies SHOULD use a Web proxy for all Web browsing activities.</p>]]></paragraph>
<paragraph
    title="14.3.6.C.02."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1593"
><![CDATA[<p>An agency’s Web proxy SHOULD authenticate system users and provide logging that includes at least the following details about websites accessed:</p><ul>
<li>address (uniform resource locator);</li>
<li>time/date;</li>
<li>system user;</li>
<li>internal IP address; and</li>
<li>external IP address.</li>
</ul>]]></paragraph>
<paragraph
    title="14.3.6.C.03."

    tags="Governance,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should Not"
    cid="1594"
><![CDATA[<p>Agencies SHOULD NOT permit downloading of executable files from external websites unless there is a demonstrable and approved business requirement.</p>]]></paragraph>
</block>
<block title="Applications and plug-ins"><paragraph
    title="14.3.7.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Web browsers can be configured to allow the automatic launching of downloaded files.  This can occur with or without the system user’s knowledge thus making the workstation vulnerable to attack.</p>]]></paragraph>
<paragraph
    title="14.3.7.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1597"
><![CDATA[<p>Agencies SHOULD disable the automatic launching of files downloaded from external websites.</p>]]></paragraph>
</block>
<block title="Inspection of TLS"><paragraph
    title="14.3.8.R.01."

    tags="Technical,Software Security,TLS,Web Applications"


><![CDATA[<p>As TLS encrypted Web traffic travelling over HTTPS connections can deliver content without any filtering, agencies can reduce this security risk by using TLS inspection so that the Web traffic can be filtered.</p>]]></paragraph>
<paragraph
    title="14.3.8.R.02."

    tags="Technical,Software Security,TLS,Web Applications"


><![CDATA[<p>An alternative of using an allow list for HTTPS websites can allow websites that have a low security risk of delivering malicious code and have a high privacy requirement like Web banking, to continue to have end-to-end encryption.</p>]]></paragraph>
<paragraph
    title="14.3.8.R.03."

    tags="Technical,Software Security,TLS,Web Applications"


><![CDATA[<p>It is however, important to note that there are many recorded cases of websites generally considered to be a low security risk that have been compromised.</p>]]></paragraph>
<paragraph
    title="14.3.8.C.01."

    tags="Technical,Software Security,TLS,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1602"
><![CDATA[<p>Agencies permitting TLS through their gateways SHOULD implement:</p><ul>
<li>a solution that decrypts and inspects the TLS traffic as per content filtering requirements; or</li>
<li>an allow list specifying the addresses (uniform resource locators) to which encrypted connections are permitted, with all other addresses blocked.</li>
</ul>]]></paragraph>
</block>
<block title="Legal advice on the Inspection of TLS traffic"><paragraph
    title="14.3.9.R.01."

    tags="Governance,Software Security,TLS,Web Applications"


><![CDATA[<p>Encrypted TLS traffic may contain personal information. Agencies should seek legal advice on whether inspecting such traffic is in breach of the Privacy Act or other legislation. User policies should incorporate an explanation of the security drivers and acknowledgement from users on the policy contents and requirements. Refer to <a title="Personnel security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a> and <a title="Email security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15182">Chapter 15 – Email Security</a>.</p>]]></paragraph>
<paragraph
    title="14.3.9.C.01."

    tags="Governance,Software Security,TLS,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1605"
><![CDATA[<p>Agencies SHOULD seek legal advice regarding the inspection of encrypted TLS traffic by their gateways.</p>]]></paragraph>
</block>
<block title="Allow listing / Deny listing websites"><paragraph
    title="14.3.10.R.01."

    tags="Technical,Allow listing,Software Security,Web Applications"


><![CDATA[<p>Defining an allow list of permitted websites and blocking all unlisted websites limits one of the most common data delivery and exfiltration techniques used by malicious code. However, if agency personnel have a legitimate requirement to access a numerous and rapidly changing list of websites, agencies will need to consider the practicality and costs of such an implementation. In such cases deny listing is a limited but none-the-less effective measure.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.01."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1609"
><![CDATA[<p>Agencies SHOULD implement allow listing for all HTTP traffic being communicated through their gateways.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.02."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1608"
><![CDATA[<p>Agencies using an allow list on their gateways to specify the external addresses, to which encrypted connections are permitted, SHOULD specify allow list addresses by domain name or IP address.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.03."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1610"
><![CDATA[<p>If agencies do not allow list websites they SHOULD deny list websites to prevent access to known malicious websites.</p>]]></paragraph>
<paragraph
    title="14.3.10.C.04."

    tags="Technical,Allow listing,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1611"
><![CDATA[<p>Agencies deny listing websites SHOULD update the deny list on a frequent basis to ensure that it remains effective.</p>]]></paragraph>
</block>
<block title="Client-side active content"><paragraph
    title="14.3.11.R.01."

    tags="Technical,Software Security,Web Applications"


><![CDATA[<p>Software that runs on agency systems SHOULD be controlled by the agency. Active content delivered though websites should be constrained so that it cannot arbitrarily access system users’ files or deliver malicious code. Unfortunately the implementations of Web browsers regularly contain flaws that permit such activity.</p>]]></paragraph>
<paragraph
    title="14.3.11.C.01."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1614"
><![CDATA[<p>Agencies SHOULD block client-side active content, such as Java and ActiveX, which are assessed as having a limited business impact.</p>]]></paragraph>
<paragraph
    title="14.3.11.C.02."

    tags="Technical,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="1615"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>use client-side controls that allow JavaScript on a per website basis; and</li>
<li>add JavaScript functions used only for malicious purposes to the agency Web content filter or IDS/IPS.</li>
</ul>]]></paragraph>
</block>
<block title="Web content filter"><paragraph
    title="14.3.12.R.01."

    tags="Technical,Software Security,Web Applications,Content Filtering"


><![CDATA[<p>Using a Web proxy provides agencies with an opportunity to filter potentially harmful information to system users and their workstations.</p>]]></paragraph>
<paragraph
    title="14.3.12.C.01."

    tags="Technical,Software Security,Web Applications,Content Filtering"


    classification="All Classifications"
    compliance="Should"
    cid="1618"
><![CDATA[<p>Agencies SHOULD use the Web proxy to filter content that is potentially harmful to system users and their workstations.</p>]]></paragraph>
</block>
<block title="Website Passwords"><paragraph
    title="14.3.13.R.01."

    tags="Technical,Passwords,Software Security,Web Applications"


><![CDATA[<p>Some websites require the use of a userID and password as the authentication mechanism. The management of passwords on these websites is often insecure and there are numerous examples of compromises where tens of thousands, and sometimes millions of passwords are compromised in a single incident. Where the same password is used on multiple websites, an incident can potentially compromise the user’s account on every website using that password. It is important to treat these websites as insecure and manage passwords appropriately.</p>]]></paragraph>
<paragraph
    title="14.3.13.C.01."

    tags="Technical,Passwords,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Must Not"
    cid="1621"
><![CDATA[<p>Users MUST NOT use agency userID and login passwords as credentials for external websites.</p>]]></paragraph>
<paragraph
    title="14.3.13.C.02."

    tags="Technical,Passwords,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should Not"
    cid="1622"
><![CDATA[<p>Users SHOULD NOT store web site authentication credentials (userID and password) on workstations, remote access devices (such as laptops) or BYO devices.</p>]]></paragraph>
<paragraph
    title="14.3.13.C.03."

    tags="Technical,Passwords,Software Security,Web Applications"


    classification="All Classifications"
    compliance="Should Not"
    cid="1623"
><![CDATA[<p>Users SHOULD NOT use the same password for multiple websites.</p>]]></paragraph>
</block>
</subsection>
</section>
