11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

72 Part II: Designing Secure <strong>Web</strong> <strong>Application</strong>sTable 4.1 <strong>Web</strong> <strong>Application</strong> Vulnerabilities <strong>and</strong> Potential Problem Due to Bad Design (continued)Vulnerability Category Potential Problem Due to Bad DesignSensitive DataConfidential information disclosure <strong>and</strong> data tampering.Session ManagementCryptographyParameter ManipulationException ManagementAuditing <strong>and</strong> LoggingCapture of session identifiers resulting in session hijacking <strong>and</strong>identity spoofing.Access to confidential data or account credentials, or both.Path traversal attacks, comm<strong>and</strong> execution, <strong>and</strong> bypass of accesscontrol mechanisms among others, leading to informationdisclosure, elevation of privileges, <strong>and</strong> denial of service.Denial of service <strong>and</strong> disclosure of sensitive system level details.Failure to spot the signs of intrusion, inability to prove a user’sactions, <strong>and</strong> difficulties in problem diagnosis.Deployment ConsiderationsDuring the application design phase, you should review your corporate securitypolicies <strong>and</strong> procedures together with the infrastructure your application is to bedeployed on. Frequently, the target environment is rigid, <strong>and</strong> your application designmust reflect the restrictions. Sometimes design tradeoffs are required, for example,because of protocol or port restrictions, or specific deployment topologies. Identifyconstraints early in the design phase to avoid surprises later <strong>and</strong> involve members ofthe network <strong>and</strong> infrastructure teams to help with this process.Figure 4.2 shows the various deployment aspects that require design timeconsideration.<strong>Application</strong> <strong>Security</strong>Local<strong>Application</strong>TierNetwork Infrastructure <strong>Security</strong>RouterHost <strong>Security</strong>Deployment TopologiesFirewallRemote<strong>Application</strong>TierSwitch<strong>Security</strong> Policies <strong>and</strong> ProceduresFigure 4.2Deployment considerations

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!