07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Test</strong>ing for Security Best Practices<br />

<strong>Test</strong>ing the <strong>Enterprise</strong> <strong>Library</strong> application blocks to see if they conform to security<br />

best practices involves several activities:<br />

●<br />

●<br />

●<br />

●<br />

Establish the security requirements. Security requirements are the goals and<br />

constraints that affect the confidentiality, integrity, and availability of the application<br />

blocks.<br />

Analyze the application block. To analyze an application block, identify such<br />

things as its assets, its entry points, and its dependencies. Create a diagram that<br />

shows the relevant subsystems that make up the application block<br />

Build the threat models. Threat models allow you to systematically identify and<br />

rate the threats that are most likely to affect your applications. By identifying and<br />

rating threats based, you can address threats with appropriate countermeasures in<br />

a logical order, starting with the threats that present the greatest risk.<br />

Perform the security reviews. Apply a set of security rules, known as security<br />

checklists, which constitute the security review. These checklists incorporate the<br />

knowledge acquired by performing the previous steps. The review process should<br />

be an iterative one that frequently occurs.<br />

This chapter focuses on the security review of the Logging Application Block. However,<br />

because the material is intended to show all the aspects of a security review,<br />

there are some examples that other application blocks in the <strong>Enterprise</strong> <strong>Library</strong>.<br />

You can adapt the templates and checklists included here to suit your own security<br />

review process.<br />

For more information about what constitutes security best practices, see Additional<br />

Resources.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!