07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Test</strong>ing for Security Best Practices 133<br />

Threat 1<br />

Countermeasures<br />

STRIDE<br />

classification<br />

Risk<br />

Mitigation<br />

Investigative<br />

notes<br />

Logging Application Block assemblies are not strong named.<br />

The Logging Application Block assemblies must be strong named in order<br />

to prevent malicious users from tampering with them or replacing them.<br />

Tampering can occur when the assemblies are distributed or when the application<br />

that uses the Logging Application Block is installed. Replacing the<br />

legal assemblies with other assemblies can occur after the application is<br />

installed. The legal assemblies also can be overridden at run time.<br />

In addition to being strong named, assemblies should be signed with<br />

Authenticode. Strong naming ensures the integrity of the code and Authenticode<br />

ensures its authenticity. For more information about Authenticode, see<br />

Authenticode on MSDN.<br />

Tampering, Information Disclosure, Denial of Service, Elevation of Privileges<br />

High<br />

No<br />

None<br />

Table 8 lists the DREAD rating for threat 1.<br />

Table 8: Threat 1 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Table 9 lists details about threat 2.<br />

Table 9: Logging Application Block Threat 2<br />

Threat 2<br />

Name<br />

Entry points<br />

Threat description<br />

Countermeasures<br />

STRIDE<br />

classification<br />

Risk<br />

Mitigation<br />

Investigative<br />

notes<br />

Attackers can alter the configuration files.<br />

Tampering with configuration files<br />

Configuration files<br />

The configuration files are in plaintext. They contain information about trace<br />

listeners, formatters, and filters. An attacker can alter this information and<br />

also add custom handlers. These actions can change the behavior of the<br />

application block and expose sensitive information.<br />

The configuration files should be encrypted or else plaintext configuration<br />

files should not be used. The application should use the Cryptography Application<br />

Block in conjunction with the Logging Application Block to encrypt<br />

the configuration file.<br />

Tampering, Information Disclosure, Denial of Service<br />

High<br />

No<br />

None

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!