Escolar Documentos
Profissional Documentos
Cultura Documentos
ndice
Prlogo ........................................................................................................11
&DStWXOR,,QWURGXFFLyQDODIRUWLFDFLyQ ...............................................13
,QWURGXFFLyQDODIRUWLFDFLyQGHHQWRUQRV ............................................................13
2. Defensa en profundidad ............................................................................................15
Procedimientos, concienciacin y polticas .................................................................16
6HJXULGDGItVLFD ...........................................................................................................17
Seguridad del permetro ...............................................................................................17
Seguridad en la red interna ..........................................................................................19
Seguridad a nivel de servidor ......................................................................................20
Seguridad en la aplicacin ...........................................................................................20
6HJXULGDGDQLYHOGHODLQIRUPDFLyQ ............................................................................21
3. Mnimo privilegio posible .........................................................................................22
4. Mnimo punto de exposicin.....................................................................................22
5. Gestin de riesgos ......................................................................................................24
6REUH*3*\VXPRGRGHIXQFLRQDPLHQWR ..................................................................45
&LIUDGRVLPpWULFRFRQ*3* .........................................................................................46
&LIUDGRDVLPpWULFRFRQ*3* ........................................................................................47
5. Otras protecciones .....................................................................................................49
ndice
&DStWXOR9,)RUWLFDFLyQGHXQHQWRUQR/$03 ..................................211
1. Instalacin de un entorno LAMP .......................................................................... 211
JJJ
2. MySQL .....................................................................................................................214
Direccin de escucha .................................................................................................214
&DUJDGHFKHURVORFDOHV ...........................................................................................214
Renombrar el usuario root .........................................................................................215
&RPSUREDUH[LVWHQFLDGHXVXDULRVDQyQLPRV ............................................................215
Controlar los privilegios de los usuarios ...................................................................216
mysql_secure_installation..........................................................................................216
3. PHP...........................................................................................................................216
H[SRVHBSKS ................................................................................................................217
display_errors ............................................................................................................217
open_basedir ..............................................................................................................217
GLVDEOHBIXQFWLRQV .......................................................................................................218
Deshabilitar RFI.........................................................................................................218
Suhosin ......................................................................................................................219
$SDFKH ......................................................................................................................220
&RQJXUDFLRQHVJOREDOHV ...........................................................................................220
'HVKDELOLWDULQIRUPDFLyQRIUHFLGDSRUHOVHUYLGRU .....................................................221
&RQJXUDFLRQHVSRUFRQWH[WR ....................................................................................222
mod_security..............................................................................................................226
HTTPS .......................................................................................................................228
&DStWXOR9,,)RUWLFDFLyQ\VHJXULGDGHQ66+ ...................................233
1. Introduccin a SSH .................................................................................................233
Funcionamiento del protocolo ...................................................................................233
/DSULPHUDFRQH[LyQ ..................................................................................................235
&RQJXUDFLyQGHOVHUYLFLR ......................................................................................235
Archivos del servicio .................................................................................................236
Directivas bsicas ......................................................................................................238
Autenticacin con contrasea ....................................................................................241
Clave pblica y clave privada ....................................................................................242
5HVXPHQGHOSURFHVRGHFRQH[LyQ .............................................................................244
3. Aplicaciones con SSH ..............................................................................................246
JJJ
ndice
JJJ