11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

300 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>s<strong>Web</strong> Server<strong>Application</strong>ServerDatabaseServer<strong>Web</strong><strong>Application</strong>DCOMPerimeterFirewallInternalFirewallEnterprise ServicesServer <strong>Application</strong>(dllhost.exe)Figure 11.1Serviced components in a middle-tier Enterprise Services applicationHow to Use This ChapterThis chapter is developer focused <strong>and</strong> shows how to build secure servicedcomponents.To get the most of this chapter:● Use this chapter in conjunction with the Enterprise Services section inChapter 17, “Securing Your <strong>Application</strong> Server.” The section in Chapter 17describes how to secure the Enterprise Services infrastructure <strong>and</strong> how to lockdown your deployed Enterprise Services application.● Use the recommendations covered in Chapter 7, “Building Secure Assemblies.”The chapter teaches you secure coding practices that can be applied when youdevelop serviced component code.<strong>Threats</strong> <strong>and</strong> CountermeasuresThe top threats that you must address when building serviced components are:●●●●●Network eavesdroppingUnauthorized accessUnconstrained delegationDisclosure of configuration dataRepudiation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!