11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IntroductionThis guide gives you a solid foundation for designing, building, <strong>and</strong> configuringsecure ASP.NET <strong>Web</strong> applications. Whether you have existing applications or arebuilding new ones, you can apply the guidance to help you make sure that your<strong>Web</strong> applications are hack-resilient.The information in this guide is based on proven practices for improving your<strong>Web</strong> application’s security. The guidance is task-based <strong>and</strong> presented in parts thatcorrespond to product life cycles, tasks, <strong>and</strong> roles.● Part I, “Introduction to <strong>Threats</strong> <strong>and</strong> Countermeasures,” identifies <strong>and</strong> illustratesthe various threats facing the network, host, <strong>and</strong> application layers. The process ofthreat modeling helps you to identify those threats that can harm your application.By underst<strong>and</strong>ing these threats, you can identify <strong>and</strong> prioritize effectivecountermeasures.● Part II, “Designing Secure <strong>Web</strong> <strong>Application</strong>s,” gives you the guidance yourequire to design secure <strong>Web</strong> applications. Even if you have deployed yourapplication, we recommend that you examine <strong>and</strong> evaluate the concepts,principles, <strong>and</strong> techniques outlined in this part.● Part III, “Building Secure <strong>Web</strong> <strong>Application</strong>s,” allows you to apply the securedesign practices introduced in Part II to create secure implementations. You willlearn defensive coding techniques that make your code <strong>and</strong> application resilientto attack.● Part IV, “Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>,” describes how youwill apply security configuration settings to secure these three interrelated levels.Instead of applying security r<strong>and</strong>omly, you will learn the rationale behind thesecurity recommendations.● Part V, “Assessing Your <strong>Security</strong>,” provides the tools you require to evaluate thesuccess of your security efforts. Starting with the application, you’ll take an insideoutapproach to evaluating your code <strong>and</strong> design. You’ll follow this with anoutside-in view of the security risks that challenge your network, host <strong>and</strong>application.Why We Wrote This GuideTraditionally, security has been considered a network issue, where the firewall is theprimary defense (the fortress model) or something that system administrators h<strong>and</strong>leby locking down the host computers. <strong>Application</strong> architects <strong>and</strong> developers havetraditionally treated security as an afterthought or as a feature to be considered astime permits — usually after performance considerations are addressed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!