11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

422 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>How to Use This ChapterThis chapter provides a methodology <strong>and</strong> the steps required to secure your <strong>Web</strong>server. You can adapt the methodology for your own situation. The steps are modular<strong>and</strong> demonstrate how you can put the methodology in practice. You can use theseprocedures on existing <strong>Web</strong> servers or on new ones.To gain the most from this chapter:● Read Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures.” This will give you a broaderunderst<strong>and</strong>ing of potential threats to <strong>Web</strong> applications.● Use the Snapshot. The section “Snapshot of a Secure <strong>Web</strong> Server” lists <strong>and</strong>explains the attributes of a secure <strong>Web</strong> server. It reflects input from a variety ofsources including customers, industry experts, <strong>and</strong> internal Microsoftdevelopment <strong>and</strong> support teams. Use the snapshot table as a reference whenconfiguring your server.● Use the Checklist. “Checklist: Securing Your <strong>Web</strong> Server” in the “Checklist”section of this guide provides a printable job aid for quick reference. Use the taskbasedchecklist to quickly evaluate the scope of the required steps <strong>and</strong> to help youwork through the individual steps.● Use the “How To” Section. The “How To” section in this guide includes thefollowing instructional articles:● “How To: Use URLScan”● “How To: Use Microsoft Baseline <strong>Security</strong> Analyzer”● “How To: Use IISLockdown”<strong>Threats</strong> <strong>and</strong> CountermeasuresThe fact that an attacker can strike remotely makes a <strong>Web</strong> server an appealing target.Underst<strong>and</strong>ing threats to your <strong>Web</strong> server <strong>and</strong> being able to identify appropriatecountermeasures permits you to anticipate many attacks <strong>and</strong> thwart the evergrowingnumbers of attackers.The main threats to a <strong>Web</strong> server are:● Profiling● Denial of service● Unauthorized access● Arbitrary code execution● Elevation of privileges● Viruses, worms, <strong>and</strong> Trojan horses

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!