11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

62 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresStep 5. Document the <strong>Threats</strong>To document the threats of your application, use a template that shows several threatattributes similar to the one below. The threat description <strong>and</strong> threat target areessential attributes. Leave the risk rating blank at this stage. This is used in the finalstage of the threat modeling process when you prioritize the identified threat list.Other attributes you may want to include are the attack techniques, which can alsohighlight the vulnerabilities exploited, <strong>and</strong> the countermeasures that are required toaddress the threat.Table 3.4 Threat 1Threat DescriptionThreat targetAttacker obtains authentication credentials by monitoring the network<strong>Web</strong> application user authentication processRiskAttack techniquesCountermeasuresUse of network monitoring softwareUse SSL to provide encrypted channelTable 3.5 Threat 2Threat DescriptionThreat targetInjection of SQL comm<strong>and</strong>sData access componentRiskAttack techniquesCountermeasuresAttacker appends SQL comm<strong>and</strong>s to user name, which is used to form aSQL queryUse a regular expression to validate the user name, <strong>and</strong> use a storedprocedure that uses parameters to access the database.Step 6. Rate the <strong>Threats</strong>At this stage in the process, you have a list of threats that apply to your particularapplication scenario. In the final step of the process, you rate threats based on therisks they pose. This allows you to address the threats that present the most risk first,<strong>and</strong> then resolve the other threats. In fact, it may not be economically viable toaddress all of the identified threats, <strong>and</strong> you may decide to ignore some because ofthe chance of them occurring is small <strong>and</strong> the damage that would result if they did isminimal.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!