11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8Code Access <strong>Security</strong> in PracticeIn This Chapter●●●●●●●OverviewCode access security explainedUsing APTCARequesting permissionsS<strong>and</strong>boxing privileged codeAuthorizing code with identity dem<strong>and</strong>sSerialization, delegates, <strong>and</strong> threadingCalling unmanaged codeCode access security is a resource constraint model designed to restrict the types ofsystem resource that code can access <strong>and</strong> the types of privileged operation that thecode can perform. These restrictions are independent of the user who calls the codeor the user account under which the code runs.Code access security delivers three main benefits. By using code access security,you can:● Restrict what your code can doFor example, if you develop an assembly that performs file I/O you can usecode access security to restrict your code’s access to specific files or directories.This reduces the opportunities for an attacker to coerce your code to accessarbitrary files.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!