11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: <strong>Threats</strong> <strong>and</strong> Countermeasures 35Sensitive DataSensitive data is subject to a variety of threats. Attacks that attempt to view or modifysensitive data can target persistent data stores <strong>and</strong> networks. Top threats to sensitivedata include:● Access to sensitive data in storage● Network eavesdropping● Data tamperingAccess to Sensitive Data in StorageYou must secure sensitive data in storage to prevent a user — malicious or otherwise— from gaining access to <strong>and</strong> reading the data.Countermeasures to protect sensitive data in storage include:● Use restricted ACLs on the persistent data stores that contain sensitive data.● Store encrypted data.● Use identity <strong>and</strong> role-based authorization to ensure that only the user or userswith the appropriate level of authority are allowed access to sensitive data. Userole-based security to differentiate between users who can view data <strong>and</strong> userswho can modify data.Network EavesdroppingThe HTTP data for <strong>Web</strong> application travels across networks in plaintext <strong>and</strong> is subjectto network eavesdropping attacks, where an attacker uses network monitoringsoftware to capture <strong>and</strong> potentially modify sensitive data.Countermeasures to prevent network eavesdropping <strong>and</strong> to provide privacy include:●●Encrypt the data.Use an encrypted communication channel, for example, SSL.Data TamperingData tampering refers to the unauthorized modification of data, often as it is passedover the network.One countermeasure to prevent data tampering is to protect sensitive data passedacross the network with tamper-resistant protocols such as hashed messageauthentication codes (HMACs).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!