We are attempting to FTP a file from our iSeries to a Unix system. The secure connection is set up via a VPN tunnel....
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Can you offer some best practices to enable the connection without opening ourselves up to security risks?
It sounds like you've already taken some strong measures toward securing your FTP connection. The first and most important step is to realize that FTP is an inherently insecure protocol and must be implemented only in the presence of compensating controls. FTP uses unencrypted connections, leaving both the data you transfer and your credentials exposed to eavesdropping attacks. This can be remedied this through the use of encryption, either by using Secure FTP (SFTP), which tunnels FTP through an encrypted SSH connection, or by using a VPN to encrypt the traffic.
Second, follow normal user security principles. If you're not running an anonymous FTP download service, provide each user with a unique username and strong password that they may use to access your FTP server.
Finally, configure your systems in a secure manner. Ensure that the FTP server is running a modern operating system and has all current security patches applied. Verify firewall settings and ensure that you allow the minimum number of ports from as few destinations as possible while still meeting business requirements.
Dig Deeper on SSL and TLS VPN Security
Related Q&A from Mike Chapple
The OWASP Top Ten list is not a compliance standard but a set of best practices for enterprises looking to boost Web app security. Here's how to get ...continue reading
A data breach notification policy is important to have, but deciding how to alert customers can be tough. Expert Mike Chapple explains some best ...continue reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.