11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

xii<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresCryptography .......................................................................................................... 119Why Do You Use Particular Algorithms?................................................................. 119How Do You Secure Encryption Keys?................................................................... 120Parameter Manipulation .......................................................................................... 120Do You Validate All Input Parameters? .................................................................. 121Do You Pass Sensitive Data in Parameters?.......................................................... 121Do You Use HTTP Header Data for <strong>Security</strong>? ......................................................... 121Exception Management ........................................................................................... 122Do You Use Structured Exception H<strong>and</strong>ling?.......................................................... 122Do You Reveal Too Much Information to the Client? ............................................... 122Auditing <strong>and</strong> Logging ............................................................................................... 123Have You Identified Key Activities to Audit? ........................................................... 123Have You Considered How to Flow Original Caller Identity? ..................................... 124Have You Considered Secure Log File Management Policies? ................................. 124Summary ............................................................................................................... 124Additional Resources .............................................................................................. 125Part IIIBuilding Secure <strong>Web</strong> <strong>Application</strong>s 127Chapter 6.NET <strong>Security</strong> Overview 129In This Chapter ....................................................................................................... 129Overview ................................................................................................................ 129How to Use This Chapter ......................................................................................... 130Managed Code Benefits .......................................................................................... 130User vs. Code <strong>Security</strong> ............................................................................................ 131Role-Based <strong>Security</strong> ............................................................................................ 131Code Access <strong>Security</strong>.......................................................................................... 132.NET Framework Role-Based <strong>Security</strong>........................................................................ 133Principals <strong>and</strong> Identities ...................................................................................... 134PrincipalPermission Objects................................................................................. 134Role-Based <strong>Security</strong> Checks................................................................................. 137URL Authorization ............................................................................................... 138.NET Framework <strong>Security</strong> Namespaces ..................................................................... 139System.<strong>Security</strong>.................................................................................................. 140System.<strong>Web</strong>.<strong>Security</strong>........................................................................................... 141System.<strong>Security</strong>.Cryptography .............................................................................. 141System.<strong>Security</strong>.Principal..................................................................................... 141System.<strong>Security</strong>.Policy......................................................................................... 142System.<strong>Security</strong>.Permissions ............................................................................... 142Summary ............................................................................................................... 144Additional Resources .............................................................................................. 144

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!