11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

34 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresUnauthorized Access to Configuration StoresBecause of the sensitive nature of the data maintained in configuration stores, youshould ensure that the stores are adequately secured.Countermeasures to protect configuration stores include:● Configure restricted ACLs on text-based configuration files such asMachine.config <strong>and</strong> <strong>Web</strong>.config.● Keep custom configuration stores outside of the <strong>Web</strong> space. This removes thepotential to download <strong>Web</strong> server configurations to exploit their vulnerabilities.Retrieval of Plaintext Configuration SecretsRestricting access to the configuration store is a must. As an important defense indepth mechanism, you should encrypt sensitive data such as passwords <strong>and</strong>connection strings. This helps prevent external attackers from obtaining sensitiveconfiguration data. It also prevents rogue administrators <strong>and</strong> internal employeesfrom obtaining sensitive details such as database connection strings <strong>and</strong> accountcredentials that might allow them to gain access to other systems.Lack of Individual AccountabilityLack of auditing <strong>and</strong> logging of changes made to configuration information threatensthe ability to identify when changes were made <strong>and</strong> who made those changes. Whena breaking change is made either by an honest operator error or by a maliciouschange to grant privileged access, action must first be taken to correct the change.Then apply preventive measures to prevent breaking changes to be introduced in thesame manner. Keep in mind that auditing <strong>and</strong> logging can be circumvented by ashared account; this applies to both administrative <strong>and</strong> user/application/serviceaccounts. Administrative accounts must not be shared. User/application/serviceaccounts must be assigned at a level that allows the identification of a single source ofaccess using the account, <strong>and</strong> that contains any damage to the privileges granted thataccount.Over-privileged <strong>Application</strong> <strong>and</strong> Service AccountsIf application <strong>and</strong> service accounts are granted access to change configurationinformation on the system, they may be manipulated to do so by an attacker. The riskof this threat can be mitigated by adopting a policy of using least privileged service<strong>and</strong> application accounts. Be wary of granting accounts the ability to modify theirown configuration information unless explicitly required by design.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!