11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xiDesign Guidelines Summary ...................................................................................... 97Summary ................................................................................................................. 98Additional Resources ................................................................................................ 98Chapter 5Architecture <strong>and</strong> Design Review for <strong>Security</strong> 99In This Chapter ......................................................................................................... 99Overview .................................................................................................................. 99How to Use This Chapter ......................................................................................... 100Architecture <strong>and</strong> Design Review Process................................................................... 100Deployment <strong>and</strong> Infrastructure Considerations .......................................................... 101Does the Network Provide Secure Communication? ............................................... 102Does Your Deployment Topology Include an Internal Firewall? ................................. 102Does Your Deployment Topology Include a Remote <strong>Application</strong> Server? ................... 102What Restrictions Does Infrastructure <strong>Security</strong> Impose? ........................................ 103Have You Considered <strong>Web</strong> Farm Issues?............................................................... 104What Trust Levels Does the Target Environment Support? ...................................... 104Input Validation....................................................................................................... 105How Do You Validate Input? ................................................................................. 106What Do You Do with the Input? ........................................................................... 107Authentication ........................................................................................................ 107Do You Separate Public <strong>and</strong> Restricted Access?.................................................... 108Have You Identified Service Account Requirements? .............................................. 108How Do You Authenticate the Caller?.................................................................... 109How Do You Authenticate with the Database? ....................................................... 109Do You Enforce Strong Account Management Practices? ........................................ 111Authorization .......................................................................................................... 111How Do You Authorize End Users?........................................................................ 112How Do You Authorize the <strong>Application</strong> in the Database?......................................... 113How Do You Restrict Access to System-Level Resources? ...................................... 113Configuration Management...................................................................................... 114Do You Support Remote Administration? .............................................................. 114Do You Secure Configuration Stores? ................................................................... 115Do You Separate Administrator Privileges?............................................................ 115Sensitive Data ........................................................................................................ 115Do You Store Secrets? ........................................................................................ 116How Do You Store Sensitive Data? ....................................................................... 117Do You Pass Sensitive Data Over the Network? ..................................................... 117Do You Log Sensitive Data?................................................................................. 117Session Management ............................................................................................. 117How Are Session Identifiers Exchanged?............................................................... 118Do You Restrict Session Lifetime?........................................................................ 118How Is the Session State Store Secured?............................................................. 118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!