11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

l<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresThe problem with the firewall, or fortress model, is that attacks can pass throughnetwork defenses directly to the application. A typical firewall helps to restrict trafficto HTTP, but the HTTP traffic can contain comm<strong>and</strong>s that exploit applicationvulnerabilities. Relying entirely on locking down your hosts is another unsuccessfulapproach. While several threats can be effectively countered at the host level,application attacks represent a serious <strong>and</strong> increasing security issue.Another area where security problems occur is deployment. A familiar scenariois when an application fails when it is deployed in a locked-down productionenvironment, which forces the administrator to loosen security settings. This oftenleads to new security vulnerabilities. In addition, a lack of security policy orapplication requirements that are inconsistent with policy can compromise security.One of the goals of this guide is to help bridge this gap between development <strong>and</strong>operations.R<strong>and</strong>om security is not enough. To make your application hack-resilient, you needa holistic <strong>and</strong> systematic approach to securing your network, host, <strong>and</strong> application.The responsibility spans phases <strong>and</strong> roles across the product life cycle. <strong>Security</strong> is nota destination; it is a journey. This guide will help you on your way.What Is a Hack-Resilient <strong>Application</strong>?This guide helps you build hack-resilient applications. A hack-resilient application isone that reduces the likelihood of a successful attack <strong>and</strong> mitigates the extent ofdamage if an attack occurs. A hack-resilient application resides on a secure host(server) in a secure network <strong>and</strong> is developed using secure design <strong>and</strong> developmentguidelines.In 2002, eWeek sponsored its fourth Open Hack challenge, which proved thathack-resilient applications can be built using .NET technologies on servers runningthe Microsoft ® Windows ® 2000 operating system. The Open Hack team built anASP.NET <strong>Web</strong> application using Microsoft Windows 2000 Advanced Server,Internet Information Services (IIS) 5.0, Microsoft SQL Server 2000, <strong>and</strong> the.NET Framework. It successfully withstood more than 82,500 attempted attacks<strong>and</strong> emerged from the competition unscathed.This guide shares the methodology <strong>and</strong> experience used to secure <strong>Web</strong> applicationsincluding the Open Hack application. In addition, the guide includes provenpractices that are used to secure networks <strong>and</strong> <strong>Web</strong> servers around the world.These methodologies <strong>and</strong> best practices are condensed <strong>and</strong> offered here as practicalguidance.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!