11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4Design Guidelines for Secure <strong>Web</strong><strong>Application</strong>sIn This Chapter●●●●●●●●●●OverviewDesigning input validation strategiesPartitioning <strong>Web</strong> sites into open <strong>and</strong> restricted areasImplementing effective account management practicesDeveloping effective authentication <strong>and</strong> authorization strategiesProtecting sensitive dataProtecting user sessionsPreventing parameter manipulationH<strong>and</strong>ling exceptions securelySecuring an application’s configuration management featuresListing audit <strong>and</strong> logging considerations<strong>Web</strong> applications present a complex set of security issues for architects, designers,<strong>and</strong> developers. The most secure <strong>and</strong> hack-resilient <strong>Web</strong> applications are those thathave been built from the ground up with security in mind.In addition to applying sound architectural <strong>and</strong> design practices, incorporatedeployment considerations <strong>and</strong> corporate security policies during the early designphases. Failure to do so can result in applications that cannot be deployed on anexisting infrastructure without compromising security.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!