11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 3: Threat Modeling 51Figure 3.3Sample application architecture diagramStart by drawing a rough diagram that conveys the composition <strong>and</strong> structure of theapplication <strong>and</strong> its subsystems together with its deployment characteristics. Then,evolve the diagram by adding details about the trust boundaries, authentication, <strong>and</strong>authorization mechanisms as <strong>and</strong> when you discover them (usually during Step 3when you decompose the application).Identify the TechnologiesIdentify the distinct technologies that are used to implement your solution. This helpsyou focus on technology-specific threats later in the process. It also helps youdetermine the correct <strong>and</strong> most appropriate mitigation techniques. The technologiesyou are most likely to identify include ASP.NET, <strong>Web</strong> Services, Enterprise Services,Microsoft .NET Remoting, <strong>and</strong> ADO.NET. Also identify any unmanaged code thatyour application calls.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!