11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xxxvIndex of Checklists 687Overview ................................................................................................................ 687Designing Checklist................................................................................................. 687Building Checklists.................................................................................................. 687Securing Checklists................................................................................................. 688Assessing Checklist ................................................................................................ 688Checklist:Architecture <strong>and</strong> Design Review 689How to Use This Checklist ....................................................................................... 689Deployment <strong>and</strong> Infrastructure Considerations .......................................................... 689<strong>Application</strong> Architecture <strong>and</strong> Design Considerations................................................... 690Input Validation................................................................................................... 690Authentication .................................................................................................... 690Authorization ...................................................................................................... 691Configuration Management.................................................................................. 692Sensitive Data .................................................................................................... 692Session Management ......................................................................................... 692Cryptography ...................................................................................................... 693Parameter Manipulation ...................................................................................... 693Exception Management ....................................................................................... 693Auditing <strong>and</strong> Logging ........................................................................................... 694ChecklistSecuring ASP.NET 695How to Use This Checklist ....................................................................................... 695Design Considerations ............................................................................................ 695<strong>Application</strong> Categories Considerations...................................................................... 696Input Validation................................................................................................... 696Authentication .................................................................................................... 696Authorization ...................................................................................................... 697Configuration Management.................................................................................. 697Sensitive Data .................................................................................................... 698Session Management ......................................................................................... 698Parameter Manipulation ...................................................................................... 698Exception Management ....................................................................................... 699Auditing <strong>and</strong> Logging ........................................................................................... 699Configuration File Settings....................................................................................... 699<strong>Web</strong> Farm Considerations .................................................................................... 702Hosting Multiple <strong>Application</strong>s............................................................................... 703ACLs <strong>and</strong> Permissions......................................................................................... 703<strong>Application</strong> Bin Directory...................................................................................... 704

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!