11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5: Architecture <strong>and</strong> Design Review for <strong>Security</strong> 125If your application has already been created, the architecture <strong>and</strong> design review isstill an important part of the security assessment process that helps you fixvulnerabilities <strong>and</strong> improve future designs.Additional ResourcesFor more information, see the following resources:●●For more information on designing, building <strong>and</strong> configuring authentication,authorization <strong>and</strong> secure communications across the tiers of a distributed<strong>Web</strong> application, see “Microsoft patterns & practices Volume I, Building SecureASP.NET <strong>Application</strong>s: Authentication, Authorization, <strong>and</strong> Secure Communication”at http://msdn.microsoft.com/library/en-us/dnnetsec/html/secnetlpMSDN.asp.For a printable checklist, see “Checklist: Architecture <strong>and</strong> Design Review for<strong>Security</strong>,” in the “Checklists” section of this guide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!