11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

17Securing Your <strong>Application</strong> ServerIn This Chapter●●●●●OverviewIdentifying threats <strong>and</strong> countermeasures for middle-tier application serversSecuring the communication channels between tiersSecuring middle-tier Remoting <strong>and</strong> <strong>Web</strong> services applicationsLocking down an Enterprise Services applicationConfiguring an internal firewallMiddle-tier application servers are most often used to host business logic <strong>and</strong> dataaccess services. This functionality is usually packaged inside Enterprise Servicesapplications or is exposed to front-end <strong>Web</strong> servers by using middle-tier <strong>Web</strong> servicesor Microsoft ® .NET Remoting technology. This chapter addresses each technologyseparately <strong>and</strong> shows you how to secure your application server in each case.Figure 17.1 shows the focus of this chapter, which includes configuring internalfirewalls that are featured in many multitiered deployment models.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!