11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5: Architecture <strong>and</strong> Design Review for <strong>Security</strong> 115Do You Secure Configuration Stores?Identify the configuration stores of your application <strong>and</strong> then examine your approachto restricting access to the stores <strong>and</strong> securing the data inside the stores.●●●Is your configuration store in the <strong>Web</strong> space?Configuration data that is held in files in the <strong>Web</strong> space is considered less securethan data that is held outside the <strong>Web</strong> space. Host configuration mistakes orundiscovered bugs could potentially allow an attacker to retrieve <strong>and</strong> downloadconfiguration files over HTTP.Is the data in the configuration store secure?Make sure that key items of configuration data, such as database connectionstrings, encryption keys, <strong>and</strong> service account credentials, are encrypted inside thestore.How is access to the configuration store restricted?Check that the administration interface provides the necessary authorization toensure that only authenticated administrators can access <strong>and</strong> manipulate the data.Do You Separate Administrator Privileges?If your administration interfaces support different functionalities — for example, sitecontent updates, service account reconfiguration, <strong>and</strong> database connection details —verify that your administration interfaces support role-based authorization todifferentiate between content developers <strong>and</strong> operators or system administrators. Forexample, the person who updates static <strong>Web</strong> site content should not necessarily beallowed to alter the credit limit of a customer or reconfigure a database connectionstring.Sensitive DataExamine how your application h<strong>and</strong>les sensitive data in store, in applicationmemory, <strong>and</strong> while in transit across the network. Table 5.5 shows the most commonvulnerabilities that are associated with h<strong>and</strong>ling sensitive data.Table 5.5 Common Vulnerabilities with H<strong>and</strong>ling Sensitive DataVulnerabilityStoring secrets when you do notneed toImplicationsThis drastically increases the security risk as opposed to notstoring the secret in the first place.Storing secrets in codeStoring secrets in clear textPassing sensitive data in cleartext over networksIf the code is on the server, an attacker might be able todownload it. Secrets are visible in binary assemblies.Anyone who can log on to the server can see secret data.Eavesdroppers can monitor the network to reveal <strong>and</strong> tamperwith the data.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!