11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: Design Guidelines for Secure <strong>Web</strong> <strong>Application</strong>s 85<strong>Web</strong> or <strong>Application</strong>ServerDatabaseServerABCDRole-basedauthorizationTrustedservice identityTrust BoundaryDatabase Tr usts the <strong>Web</strong> /<strong>Application</strong> ServerFigure 4.6Trusted subsystem model that supports database connection poolingThe third option is to use a limited set of identities for resource access based on therole membership of the caller. This is really a hybrid of the two models describedearlier. Callers are mapped to roles in the application’s logical middle tier, <strong>and</strong> accessto classes <strong>and</strong> methods is restricted based on role membership. Downstream resourceaccess is performed using a restricted set of identities determined by the currentcaller’s role membership. The advantage of this approach is that permissions can beassigned to separate logins in the database, <strong>and</strong> connection pooling is still effectivewith multiple pools of connections. The downside is that creating multiple threadaccess tokens used to establish different security contexts for downstream resourceaccess using Windows authentication is a privileged operation that requiresprivileged process accounts. This is counter to the principle of least privilege. Thehybrid model using multiple trusted service identities for downstream resourceaccess is shown in Figure 4.7.<strong>Web</strong> or <strong>Application</strong>ServerDatabaseServerABCDRole1Role2Trusted serviceidentity 1Trusted serviceidentity 2Trust BoundaryIdentity 1 <strong>and</strong> 2 havedifferent permissions in thedatabaseFigure 4.7Hybrid model

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!