11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Forewords xlvForeword by Joel ScambrayI have been privileged to contribute to <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong><strong>and</strong> Countermeasures, <strong>and</strong> its companion volume, Building Secure ASP.NET <strong>Web</strong><strong>Application</strong>s. As someone who encounters many such threats <strong>and</strong> relies on manyof these countermeasures every day at Microsoft’s largest Internet-facing onlineproperties, I can say that this guide is a necessary component of any <strong>Web</strong>-facingbusiness strategy. I’m quite excited to see this knowledge shared widely withMicrosoft’s customers, <strong>and</strong> I look forward to applying it in my daily work.There is an increasing amount of information being published about Internet security,<strong>and</strong> keeping up with it is a challenge. One of the first questions I ask when a newwork like this gets published is: “Does the quality of the information justify mytime to read it?” In the case of <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong>Countermeasures, I can answer an unqualified yes. J.D. Meier <strong>and</strong> team haveassembled a comprehensive reference on Microsoft <strong>Web</strong> application security, <strong>and</strong>put it in a modular framework that makes it readily accessible to <strong>Web</strong> applicationarchitects, developers, testers, technical managers, operations engineers, <strong>and</strong> yes,even security professionals. The bulk of information contained in this work canbe intimidating, but it is well-organized around key milestones in the productlifecycle — design, development, testing, deployment, <strong>and</strong> maintenance. It alsoadheres to a security principles-based approach, so that each section is consistentwith common security themes.Perhaps my favorite aspect of this guide is the thorough testing that went into eachpage. During several discussions with the guide’s development team, I always cameaway impressed with their willingness to actually deploy the technologies discussedherein to ensure that the theory portrayed aligned with practical reality. They alsofreely sought out expertise internal <strong>and</strong> external to Microsoft to keep the contentsuseful <strong>and</strong> practical.Some other key features that I found very useful include the concise, well-organized,<strong>and</strong> comprehensive threat modeling chapter, the abundant tips <strong>and</strong> guidelines on.NET Framework security (especially code access security), <strong>and</strong> the h<strong>and</strong>s-onchecklists for each topic discussed.<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures will get anyorganization out ahead of the Internet security curve by showing them how tobake security into applications, rather than bolting it on as an afterthought. I highlyrecommend this guide to those organizations who have developed or deployedInternet-facing applications <strong>and</strong> to those organizations who are considering suchan endeavor.Joel ScambraySenior Director of <strong>Security</strong>, MSNCo-Author, Hacking Exposed Fourth Edition, Windows, <strong>and</strong> <strong>Web</strong> <strong>Application</strong>s

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!