Say that you set up your FTP site so that it requires a username and password. When clients connect using their browsers, usernames and passwords are still sent in cleartext, as are the files being uploaded. In order to keep network sniffers from reading clients' passwords and files upon connection, you need to set up a secure FTP server.
Regarding the operating system that the FTP server should run on, it depends on what in-house expertise you have. It is no good setting up a Unix system to run your FTP site, for example, if nobody in your organization has in-depth knowledge of running the OS. The main concern is that the server is properly hardened for service on the Internet and is located on a secured DMZ (demilitarized zone) segment of the network.
The next issue to resolve is which secure FTP protocol to use. The two main choices are FTPS or SFTP.
FTPS uses an SSL/TLS layer below the standard FTP protocol to encrypt the control and/or data channels. The preferred method of use is Explicit FTPS. In this mode, the FTP client connects to port 21 on the server and starts an unencrypted FTP session as normal, but requests that TLS security be used. It then performs the appropriate handshake before sending any sensitive data. Data can be encrypted in the command channel, the data channel or ideally both. Because FTPS is just an extension of FTP, it is supported by most servers. Also, since it uses the same ports as FTP, there is no need to open any additional firewall ports.
SFTP is a newer protocol that uses Secure Shell (SSH) to provide a secure service where the server both encrypts the data and handles the file transfer. SFTP includes many file-management capabilities, such as deleting, renaming, interrupted transfer resumption and directory listings. However, the many functions make it important to set the correct permissions on your SFTP server, ensuring that least privilege access is maintained. If your website is one of several hosted on a shared server, be extra careful. If a hacker can compromise one of the other sites on the server, it's possible that the attacker could extend control to the server itself and to your site, too.
Most organizations would not want clients to be able to see the files that other clients have uploaded to the site. This requires that each client has its own username, password and directory where files are stored during the upload process.
Also consider the security of the files once they have been uploaded. Remember that they are sitting in the DMZ, and so they are at risk if the DMZ gets hacked. Some FTP server programs support file-integrity checks using cryptographic hashes. Files should be encrypted while at rest on the FTP server, and again when being transferred between the DMZ and the internal network.
Finally, to test whether your FTP service is secure, I would recommend penetration testing to validate the setup.
Dig Deeper on Web Services Security and SOA Security
Related Q&A from Michael Cobb
One-day wonders are websites that persist for 24 hour or less. Should these phenomena be an enterprise security concern? Expert Michael Cobb explains.continue reading
While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to ...continue reading
Certificate authority confidence is waning, but the emergence of public key pinning can help keep websites secure. Expert Michael Cobb explains how.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.