11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction liiiHow to Use This GuideEach chapter in the guide is modular. The guidance is task-based, <strong>and</strong> is presentedin parts which correspond to the various stages of the product development life cycle<strong>and</strong> to the people <strong>and</strong> roles involved during the life cycle including architects,developers, system administrators, <strong>and</strong> security analysts.Applying the Guidance to Your RoleEach person, regardless of role, who works on the design, development, deployment,or maintenance of <strong>Web</strong> applications <strong>and</strong> their underlying infrastructure should readPart I of this guide. Part I, “Introduction to <strong>Threats</strong> <strong>and</strong> Countermeasures,” highlights<strong>and</strong> explains the primary threats to <strong>Web</strong> applications at the network, host, <strong>and</strong>application layers. It also shows you how to create threat models to help you identify<strong>and</strong> prioritize those threats that are most relevant to your particular application.A solid underst<strong>and</strong>ing of threats <strong>and</strong> associated countermeasures is essential foranyone who is interested in securing <strong>Web</strong> applications.If you are responsible for or are involved in the design of a new or existing <strong>Web</strong>application, you should read Part II, “Designing Secure <strong>Web</strong> <strong>Application</strong>s.” Part IIhelps you identify potential vulnerabilities in your application design.If you are a developer, you should read Part III, “Building Secure <strong>Web</strong> <strong>Application</strong>s.”The information in this part helps you to develop secure code <strong>and</strong> components,including <strong>Web</strong> pages <strong>and</strong> controls, <strong>Web</strong> services, remoting components, <strong>and</strong> dataaccess code. As a developer, you should also read Part IV, “Securing Your Network,Host, <strong>and</strong> <strong>Application</strong>” to gain a better underst<strong>and</strong>ing of the type of secureenvironment that your code is likely to be deployed in. If you underst<strong>and</strong> more aboutyour target environment, the risk of issues <strong>and</strong> security vulnerabilities appearing atdeployment time is reduced significantly.If you are a system administrator, you should read Part IV, “Securing Your Network,Host, <strong>and</strong> <strong>Application</strong>.” The information in this part helps you create a securenetwork <strong>and</strong> server infrastructure — one that is tuned to support .NET <strong>Web</strong>applications <strong>and</strong> <strong>Web</strong> services.Anyone who is responsible for reviewing product security should read Part V,“Assessing Your <strong>Security</strong>”. This helps you identify vulnerabilities caused by insecurecoding techniques or deployment configurations.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!