11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

150 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sPrivileged ResourcesThe types of resources for which your code requires code access security permissionsinclude the file system, databases, registry, event log, <strong>Web</strong> services, sockets, DNSdatabases, directory services, <strong>and</strong> environment variables.Privileged OperationsOther privileged operations for which your code requires code access securitypermissions include calling unmanaged code, using serialization, using reflection,creating <strong>and</strong> controlling application domains, creating Principal objects, <strong>and</strong>manipulating security policy.For more information about the specific types of code access security permissionsrequired for accessing resources <strong>and</strong> performing privileged operations, see“Privileged Code” in Chapter 8, “Code Access <strong>Security</strong> in Practice.”Assembly Design ConsiderationsOne of the most significant issues to consider at design time is the trust level of yourassembly’s target environment, which affects the code access security permissionsgranted to your code <strong>and</strong> to the code that calls your code. This is determined by codeaccess security policy defined by the administrator, <strong>and</strong> it affects the types ofresources your code is allowed to access <strong>and</strong> other privileged operations it canperform.When designing your assembly, you should:● Identify privileged code● Identify the trust level of your target environment● S<strong>and</strong>box highly privileged code● Design your public interfaceIdentify Privileged CodeIdentify code that accesses secured resources or performs security sensitiveoperations. This type of code requires specific code access security permissions tofunction.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!