11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

102 Part II:Designing Secure <strong>Web</strong> <strong>Application</strong>sDoes the Network Provide Secure Communication?Your data is at its most vulnerable while in transit between a client <strong>and</strong> server, orserver to server. How private should the data be? Are you legally responsible forcustomer data?While your application is responsible for h<strong>and</strong>ling <strong>and</strong> transforming data securelyprior to transit, the network is responsible for the integrity <strong>and</strong> privacy of the data asit transmits. Use an appropriate encryption algorithm when the data must remainprivate. Additionally, make sure that your network devices are secured because theymaintain network integrity.Does Your Deployment Topology Include an Internal Firewall?If an internal firewall separates your <strong>Web</strong> server from an application server or adatabase server, review the following questions to ensure that your designaccommodates this:● How do downstream servers authenticate the <strong>Web</strong> server?If you use domain accounts <strong>and</strong> Windows authentication, does the firewall openthe necessary ports? If not, or if the <strong>Web</strong> server <strong>and</strong> downstream server are inseparate domains, you can use mirrored local accounts. For example, you c<strong>and</strong>uplicate the least privileged local ASPNET account that is used to run the <strong>Web</strong>application on the database server.● Do you use distributed transactions?If the <strong>Web</strong> server initiates distributed transactions using the services of theMicrosoft Distributed Transaction Coordinator (DTC), does the internal firewallopen the necessary ports for DTC communication?For more information about using the DTC through a firewall, see MicrosoftKnowledge Base article 250367, “INFO: Configuring Microsoft DistributedTransaction Coordinator (DTC) to Work Through a Firewall.”Does Your Deployment Topology Include a Remote <strong>Application</strong> Server?If your deployment topology includes a physically remote middle tier, review thefollowing questions:● Do you use Enterprise Services?If so, have you restricted the DCOM port range <strong>and</strong> does any internal firewallopen these ports?Note In some scenarios, using a middle-tier <strong>Web</strong> service as a front end to the EnterpriseServices application is a superior design choice. With this approach, the <strong>Web</strong> server cancommunicate with the application server through port 80 using Simple Object AccessProtocol (SOAP).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!