11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xxxviiChecklistSecuring Data Access 717How to Use This Checklist ....................................................................................... 717SQL Injection Checks .............................................................................................. 717Authentication ........................................................................................................ 717Authorization .......................................................................................................... 718Configuration Management...................................................................................... 718Sensitive Data ........................................................................................................ 718Exception Management ........................................................................................... 719Deployment Considerations ..................................................................................... 719ChecklistSecuring Your Network 721How to Use This Checklist ....................................................................................... 721Router Considerations............................................................................................. 721Firewall Considerations ........................................................................................... 722Switch Considerations............................................................................................. 722ChecklistSecuring Your <strong>Web</strong> Server 723How to Use This Checklist ....................................................................................... 723Patches <strong>and</strong> Updates .......................................................................................... 723IISLockdown ....................................................................................................... 723Services............................................................................................................. 723Protocols............................................................................................................ 724Accounts............................................................................................................ 724Files <strong>and</strong> Directories ........................................................................................... 725Shares............................................................................................................... 725Ports.................................................................................................................. 725Registry ............................................................................................................. 725Auditing <strong>and</strong> Logging ........................................................................................... 726Sites <strong>and</strong> Virtual Directories ................................................................................ 726Script Mappings.................................................................................................. 726ISAPI Filters........................................................................................................ 727IIS Metabase...................................................................................................... 727Server Certificates .............................................................................................. 727Machine.config ................................................................................................... 727Code Access <strong>Security</strong>.......................................................................................... 727Other Check Points ............................................................................................. 728Dos <strong>and</strong> Don’ts....................................................................................................... 728

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!