11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents xixChapter 11Building Secure Serviced Components 299In This Chapter ....................................................................................................... 299Overview ................................................................................................................ 299How to Use This Chapter ......................................................................................... 300<strong>Threats</strong> <strong>and</strong> Countermeasures ................................................................................. 300Network Eavesdropping ....................................................................................... 301Unauthorized Access........................................................................................... 301Unconstrained Delegation.................................................................................... 301Disclosure of Configuration Data .......................................................................... 302Repudiation........................................................................................................ 302Design Considerations ............................................................................................ 302Role-Based Authorization ..................................................................................... 302Sensitive Data Protection .................................................................................... 302Audit Requirements............................................................................................. 303<strong>Application</strong> Activation Type................................................................................... 303Transactions....................................................................................................... 303Code Access <strong>Security</strong>.......................................................................................... 303Authentication ........................................................................................................ 304Use (At Least) Call Level Authentication................................................................ 304Authorization .......................................................................................................... 304Enable Role-Based <strong>Security</strong> ................................................................................. 304Enable Component Level Access Checks .............................................................. 305Enforce Component Level Access Checks ............................................................. 305Configuration Management...................................................................................... 305Use Least Privileged Run-As Accounts .................................................................. 306Avoid Storing Secrets in Object Constructor Strings ............................................... 306Avoid Unconstrained Delegation ........................................................................... 306Sensitive Data ........................................................................................................ 307Auditing <strong>and</strong> Logging ............................................................................................... 308Audit User Transactions....................................................................................... 308Building a Secure Serviced Component .................................................................... 309Assembly Implementation.................................................................................... 310Serviced Component Class Implementation .......................................................... 311Code Access <strong>Security</strong> Considerations ....................................................................... 313Deployment Considerations ..................................................................................... 314Firewall Restrictions ............................................................................................ 314Summary ............................................................................................................... 316Additional Resources .............................................................................................. 317Chapter 12Building Secure <strong>Web</strong> Services 319In This Chapter ....................................................................................................... 319Overview ................................................................................................................ 319How to Use This Chapter ......................................................................................... 320

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!