11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

254 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sHow to Use This ChapterTo build secure <strong>Web</strong> pages <strong>and</strong> controls, you need to follow the correct programmingpractices that this chapter discusses. In addition to secure programming practices, usethe corresponding chapters in this guide to help you build secure ASP.NET pages <strong>and</strong>controls.● Implement the steps in Chapter 19, “Securing Your ASP.NET <strong>Application</strong> <strong>and</strong><strong>Web</strong> Services.” The chapter helps you configure ASP.NET appropriately withsecure settings in Machine.config <strong>and</strong> <strong>Web</strong>.config.● Use the accompanying checklist in the checklist section of this guide.“Checklist: Securing ASP.NET” ties the recommendations made in this chapter<strong>and</strong> in Chapter 19 together. Make sure you implement the guidance.● Underst<strong>and</strong> the threats <strong>and</strong> attacks that are specific to ASP.NET pages <strong>and</strong>controls. Apply countermeasures according to guidelines in this chapter.●●●●●Read Chapter 4, “Design Guidelines for Secure <strong>Web</strong> <strong>Application</strong>s.” Many of therecommendations in this chapter (Chapter 10) are based on the design guidelinesdiscussed in Chapter 4.Architects should use the “Design Considerations” section of this chapter.Developers should apply the guidance in this chapter to their developmentprocess.Learn the controls from a programmatic st<strong>and</strong>point to fine-tune ASP.NET pages<strong>and</strong> controls security.Use the application vulnerability categories as a means to tackle commonproblems. <strong>Application</strong> vulnerability categories provide a useful way to approach<strong>and</strong> group problems.<strong>Threats</strong> <strong>and</strong> CountermeasuresMost <strong>Web</strong> application attacks require that malicious input is passed within HTTPrequests. The general goal is either to coerce the application into performingunauthorized operations or to disrupt its normal operation. This is why thoroughinput validation is an essential countermeasure to many attacks <strong>and</strong> should be madea top priority when you develop ASP.NET <strong>Web</strong> pages <strong>and</strong> controls. Top threatsinclude:● Code injection● Session hijacking● Identity spoofing● Parameter manipulation● Network eavesdropping●Information disclosure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!