Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Test</strong>ing for Security Best Practices 133<br />
Threat 1<br />
Countermeasures<br />
STRIDE<br />
classification<br />
Risk<br />
Mitigation<br />
Investigative<br />
notes<br />
Logging Application Block assemblies are not strong named.<br />
The Logging Application Block assemblies must be strong named in order<br />
to prevent malicious users from tampering with them or replacing them.<br />
Tampering can occur when the assemblies are distributed or when the application<br />
that uses the Logging Application Block is installed. Replacing the<br />
legal assemblies with other assemblies can occur after the application is<br />
installed. The legal assemblies also can be overridden at run time.<br />
In addition to being strong named, assemblies should be signed with<br />
Authenticode. Strong naming ensures the integrity of the code and Authenticode<br />
ensures its authenticity. For more information about Authenticode, see<br />
Authenticode on MSDN.<br />
Tampering, Information Disclosure, Denial of Service, Elevation of Privileges<br />
High<br />
No<br />
None<br />
Table 8 lists the DREAD rating for threat 1.<br />
Table 8: Threat 1 DREAD Rating<br />
D R E A D Total Rating<br />
3 3 2 3 3 14 High<br />
Table 9 lists details about threat 2.<br />
Table 9: Logging Application Block Threat 2<br />
Threat 2<br />
Name<br />
Entry points<br />
Threat description<br />
Countermeasures<br />
STRIDE<br />
classification<br />
Risk<br />
Mitigation<br />
Investigative<br />
notes<br />
Attackers can alter the configuration files.<br />
Tampering with configuration files<br />
Configuration files<br />
The configuration files are in plaintext. They contain information about trace<br />
listeners, formatters, and filters. An attacker can alter this information and<br />
also add custom handlers. These actions can change the behavior of the<br />
application block and expose sensitive information.<br />
The configuration files should be encrypted or else plaintext configuration<br />
files should not be used. The application should use the Cryptography Application<br />
Block in conjunction with the Logging Application Block to encrypt<br />
the configuration file.<br />
Tampering, Information Disclosure, Denial of Service<br />
High<br />
No<br />
None