11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents xxvii.NET Remoting <strong>Security</strong> Considerations .................................................................... 486Hosting in a Windows Service (TCP Channel)......................................................... 486Hosting in IIS (HTTP Channel) .............................................................................. 486Enterprise Services (COM+) <strong>Security</strong> Considerations ................................................. 487Secure the Component Services Infrastructure...................................................... 487Secure Enterprise Services <strong>Application</strong>s ............................................................... 493Summary ............................................................................................................... 499Additional Resources .............................................................................................. 499Chapter 18Securing Your Database Server 501In This Chapter ....................................................................................................... 501Overview ................................................................................................................ 501How to Use This Chapter ......................................................................................... 502<strong>Threats</strong> <strong>and</strong> Countermeasures ................................................................................. 502SQL Injection ...................................................................................................... 503Network Eavesdropping ....................................................................................... 504Unauthorized Server Access ................................................................................ 504Password Cracking.............................................................................................. 505Methodology for Securing Your Server....................................................................... 506Configuration Categories ..................................................................................... 506SQL Server Installation Considerations..................................................................... 509What Does SQL Server Install? ............................................................................ 509SQL Server Installation Recommendations................................................................ 509Before Running SQL Server Setup ........................................................................ 510Installing SQL Server........................................................................................... 510Steps for Securing Your Database Server.................................................................. 511Step 1. Patches <strong>and</strong> Updates .................................................................................. 511Detect Missing Service Packs <strong>and</strong> Updates .......................................................... 511Patching MSDE ................................................................................................... 512Step 2. Services ..................................................................................................... 512Disable Unused SQL Server Services ................................................................... 513Disable the Microsoft DTC (if not required)............................................................ 513Step 3. Protocols.................................................................................................... 513Restrict SQL Server to TCP/IP.............................................................................. 514Harden the TCP/IP Stack..................................................................................... 514Additional Considerations .................................................................................... 514Step 4. Accounts .................................................................................................... 515Secure the SQL Server Service Account................................................................ 515Delete or Disable Unused Accounts...................................................................... 516Disable the Windows Guest Account..................................................................... 516Rename the Administrator Account....................................................................... 516Enforce Strong Password Policy............................................................................ 516Restrict Remote Logons ...................................................................................... 517Disable Null Sessions (Anonymous Logons) .......................................................... 517Additional Considerations .................................................................................... 518

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!