11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

368 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sHow to Use This ChapterTo get the most out of this chapter, read the following chapters before or inconjunction with this chapter:● Read Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures.” This will give you a broader<strong>and</strong> deeper underst<strong>and</strong>ing of potential threats <strong>and</strong> countermeasures faced by <strong>Web</strong>applications.● Read Chapter 4, “Design Guidelines for Secure <strong>Web</strong> <strong>Application</strong>s.” In thischapter, you will learn the architecture <strong>and</strong> design challenges <strong>and</strong> guidelines forbuilding a secure solution.● Read Chapter 18, “Securing Your Database Server.” Read Chapter 18 tounderst<strong>and</strong> how the database servers are secured.● Read Chapter 7, “Building Secure Assemblies.” The guidelines <strong>and</strong>recommendations in Chapter 7 for building secure assemblies <strong>and</strong> for developingsecure managed code should also be applied to data access code.● Use the Assessing Chapters. To review the security of your data access atdifferent stages of the product cycle, refer to the <strong>Web</strong> services sections in thefollowing chapters: Chapter 5, “Architecture <strong>and</strong> Design Review for <strong>Security</strong>,”Chapter 21, “Code Review,” <strong>and</strong> Chapter 22, “Deployment Review.”● Use the Checklist. “Checklist: Securing Data Access” in the Checklists section ofthis guide includes a checklist for easy reference. Use this task-based checklist as asummary of the recommendations in this chapter.<strong>Threats</strong> <strong>and</strong> CountermeasuresTo build secure data access code, know what the threats are, how commonvulnerabilities arise in data access code, <strong>and</strong> how to use appropriate countermeasuresto mitigate risk.The top threats to data access code are:● SQL injection● Disclosure of configuration data● Disclosure of sensitive application data● Disclosure of database schema <strong>and</strong> connection details● Unauthorized access● Network eavesdropping

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!