11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8: Code Access <strong>Security</strong> in Practice 189Policy Evaluation at a Policy LevelAn individual policy file at each specific level consists of a hierarchical arrangementof code groups. These code groups include membership conditions that are used todetermine which assemblies they apply to, <strong>and</strong> permission sets that are used todetermine the permissions that should be granted to matching assemblies. Ahierarchical structure enables multiple permission sets to be assigned to an assembly,<strong>and</strong> it allows security policy to support simple AND <strong>and</strong> OR logic. For example,consider the sample security policy shown in Figure 8.3.All Codeps:NothingZone:MyComputerps:FullTrustZone: LocalIntranetps:LocalIntranetPublisher:Company2ps:Comp2PSetURL:https://a.b.c.comps:ABCPSetPublisher:Company1ps:Comp1PSetLogical ANDFigure 8.3Hierarchical code groups at a single policy levelNote The All Code code group is a special code group that matches all assemblies. It forms theroot of security policy <strong>and</strong> in itself grants no permissions, because it is associated with thepermission set named Nothing.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!