07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Test</strong>ing for Security Best Practices 147<br />

Check<br />

Yes<br />

Yes<br />

Yes<br />

Yes<br />

Description<br />

Use the appropriate key sizes for the chosen cryptography algorithm. Identify and document<br />

any reasons for not following this guideline.<br />

Do not store keys in code and configuration files.<br />

Restrict access to persisted keys.<br />

Periodically cycle keys.<br />

Secrets Checklist<br />

Table 35 lists the secrets recommendations.<br />

Table 35: Secrets Checklist<br />

Check<br />

Yes<br />

No<br />

No<br />

Description<br />

Do not hard-code secrets.<br />

Do not store plaintext secrets in configuration files. The connection strings that the<br />

Data Access Application Block uses to connect to databases are stored in the configuration<br />

files. The Data Access Application Block threat model documents this issue. It<br />

recommends that you encrypt the configuration file. For more information on how to do<br />

this, see Configuring the Application Blocks in the <strong>Enterprise</strong> <strong>Library</strong> documentation.<br />

Do not store plaintext secrets in memory for extended periods of time.<br />

Currently, the Caching Application Block cannot encrypt information.<br />

continued

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!