Security Considerations When Choosing an Application Isolation Mode

Applies To: Windows Server 2003, Windows Server 2003 with SP1

When you choose an application isolation mode, keep these security considerations in mind:

  • Worker process isolation mode. Worker process isolation mode provides better default security for running Web applications than does IIS 5.0 isolation mode. In worker process isolation mode, worker processes run by default as Network Service, which is the account that provides a better balance between security and functionality.

  • IIS 5.0 isolation mode. Web applications that are set to Low isolation, such as low-isolation ISAPI extensions, run in a process that runs as LocalSystem. The LocalSystem account can read, execute, and change all of the resources on the computer. Thus, if an attack by a malicious user takes over a Web application that runs in Low isolation, many assets of the local computer are open to the attacker. Also, if you set Web applications to Medium or High isolation, they run with IWAM_ComputerName as the default identity, which has fewer rights than LocalSystem.

Windows Server 2003 provides the following built-in system accounts, which you can use to provide the security context for worker processes:

  • Local Service. Has limited rights on the local computer and limited access (Anonymous) to network resources. Use the Local Service account if the worker process does not require authenticated access to network resources.

  • Network Service. Has limited rights on the local computer and authenticated access (as the computer account) to network resources.

  • LocalSystem. Has full access to the system because it belongs to the Administrators group.

Table 3.3 provides additional details about the built-in system accounts that are available in IIS 6.0, and Table 3.4 shows the default security account for both application isolation modes**.**

Table 3.3   Built-in System Accounts in IIS 6.0

Built-in Account Privilege Level Group or Account Used on the Local Machine Group or Account Used on the Network

Local Service

Least privileged

Users group

Anonymous access account

Network Service

More privileged

Users group

Computer account

LocalSystem

Most privileged

Administrator with full access account

Computer account

Table 3.4   Default Security Accounts for Each Application Isolation Mode

Mode or Options Within a Mode Default Account

Worker process isolation mode

Network Service

IIS 5.0 isolation mode

ISAPI extensions set to Low isolation that run in Inetinfo.exe

LocalSystem

ISAPI extensions set to Medium-isolation that run in pooled out-of-process application hosts

IWAM_ComputerName

ISAPI extensions set to High-isolation that run in out-of-process application hosts

IWAM_ComputerName

ASP.NET worker processes

ASPNET

For more information about built-in security accounts in IIS 6.0 and Windows Server 2003, including IWAM_ComputerName, see Managing a Secure IIS 6.0 Solution and IIS and Built-in Accounts.