11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

xx<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures<strong>Threats</strong> <strong>and</strong> Countermeasures ................................................................................. 320Unauthorized Access........................................................................................... 321Parameter Manipulation ...................................................................................... 322Network Eavesdropping ....................................................................................... 322Disclosure of Configuration Data .......................................................................... 323Message Replay ................................................................................................. 323Design Considerations ............................................................................................ 325Authentication Requirements ............................................................................... 325Privacy <strong>and</strong> Integrity Requirements ....................................................................... 325Resource Access Identities.................................................................................. 325Code Access <strong>Security</strong>.......................................................................................... 326Input Validation....................................................................................................... 326Strongly Typed Parameters................................................................................... 326Loosely Typed Parameters ................................................................................... 328XML Data ........................................................................................................... 328SQL Injection ...................................................................................................... 331Cross-Site Scripting............................................................................................. 331Authentication ........................................................................................................ 332Platform Level Authentication............................................................................... 332Message Level Authentication.............................................................................. 333<strong>Application</strong> Level Authentication........................................................................... 335Authorization .......................................................................................................... 335<strong>Web</strong> Service Endpoint Authorization...................................................................... 336<strong>Web</strong> Method Authorization ................................................................................... 336Programmatic Authorization ................................................................................. 336Sensitive Data ........................................................................................................ 337XML Encryption................................................................................................... 337Encrypting Parts of a Message............................................................................. 338Parameter Manipulation .......................................................................................... 339Exception Management ........................................................................................... 339Using SoapExceptions......................................................................................... 340<strong>Application</strong> Level Error H<strong>and</strong>ling in Global.asax...................................................... 341Auditing <strong>and</strong> Logging ............................................................................................... 341Proxy Considerations............................................................................................... 341Code Access <strong>Security</strong> Considerations ....................................................................... 342Deployment Considerations ..................................................................................... 343Intranet Deployment............................................................................................ 343Extranet Deployment ........................................................................................... 343Internet Deployment............................................................................................ 344Summary ............................................................................................................... 345Additional Resources .............................................................................................. 345

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!