11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

42 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresUser Denies Performing an OperationThe issue of repudiation is concerned with a user denying that he or she performedan action or initiated a transaction. You need defense mechanisms in place to ensurethat all user activity can be tracked <strong>and</strong> recorded.Countermeasures to help prevent repudiation threats include:● Audit <strong>and</strong> log activity on the <strong>Web</strong> server <strong>and</strong> database server, <strong>and</strong> on theapplication server as well, if you use one.● Log key events such as transactions <strong>and</strong> login <strong>and</strong> logout events.●Do not use shared accounts since the original source cannot be determined.Attackers Exploit an <strong>Application</strong> Without Leaving a TraceSystem <strong>and</strong> application-level auditing is required to ensure that suspicious activitydoes not go undetected.Countermeasures to detect suspicious activity include:●●●Log critical application level operations.Use platform-level auditing to audit login <strong>and</strong> logout events, access to the filesystem, <strong>and</strong> failed object access attempts.Back up log files <strong>and</strong> regularly analyze them for signs of suspicious activity.Attackers Cover Their TracksYour log files must be well-protected to ensure that attackers are not able to covertheir tracks.Countermeasures to help prevent attackers from covering their tracks include:● Secure log files by using restricted ACLs.● Relocate system log files away from their default locations.SummaryBy being aware of the typical approach used by attackers as well as their goals, youcan be more effective when applying countermeasures. It also helps to use a goalbasedapproach when considering <strong>and</strong> identifying threats, <strong>and</strong> to use the STRIDEmodel to categorize threats based on the goals of the attacker, for example, to spoofidentity, tamper with data, deny service, elevate privileges, <strong>and</strong> so on. This allowsyou to focus more on the general approaches that should be used for risk mitigation,rather than focusing on the identification of every possible attack, which can be atime-consuming <strong>and</strong> potentially fruitless exercise.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!