11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

xxxviii<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresChecklistSecuring Your Database Server 729How to Use This Checklist ....................................................................................... 729Installation Considerations for Production Servers..................................................... 729Patches <strong>and</strong> Updates .............................................................................................. 729Services................................................................................................................. 730Protocols................................................................................................................ 730Accounts................................................................................................................ 730Files <strong>and</strong> Directories ............................................................................................... 731Shares................................................................................................................... 731Ports...................................................................................................................... 731Registry ................................................................................................................. 731Auditing <strong>and</strong> Logging ............................................................................................... 732SQL Server <strong>Security</strong> ................................................................................................ 732SQL Server Logins, Users, <strong>and</strong> Roles........................................................................ 732SQL Server Database Objects.................................................................................. 733Additional Considerations ........................................................................................ 733Staying Secure........................................................................................................ 733Checklist<strong>Security</strong> Review for Managed Code 735How to Use This Checklist ....................................................................................... 735General Code Review Guidelines .............................................................................. 735Managed Code Review Guidelines ............................................................................ 735Assembly-Level Checks ....................................................................................... 735Class-Level Checks ............................................................................................. 736Cryptography ...................................................................................................... 736Secrets .............................................................................................................. 737Exception Management ....................................................................................... 737Delegates........................................................................................................... 737Serialization ....................................................................................................... 737Threading ........................................................................................................... 738Reflection........................................................................................................... 738Unmanaged Code Access .................................................................................... 738Resource Access Considerations ............................................................................. 739File I/O .............................................................................................................. 739Event Log ........................................................................................................... 739Registry ............................................................................................................. 739Environment Variables ......................................................................................... 740Code Access <strong>Security</strong> Considerations ....................................................................... 740

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!