11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

476 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>PerimeterFirewallEnterprise Services<strong>Web</strong> Services.NET RemotingClient<strong>Web</strong> Server<strong>Application</strong>ServerSQLServerOptional InternalFirewallsFigure 17.1Remote application server deployment modelBefore delving into technology-specific configuration, the chapter identifies the mainthreats to an application server. These threats are somewhat different from those thatapply to an Internet-facing <strong>Web</strong> server because middle-tier application servers are (orshould be) isolated from direct Internet access.To secure the application server, you must apply an incremental securityconfiguration after the underlying operating system <strong>and</strong> Internet InformationServices (IIS) <strong>Web</strong> server (if installed) have been locked down.How to Use This ChapterThis chapter focuses on the application server <strong>and</strong> the associated communicationchannels that connect the <strong>Web</strong> server to the application server <strong>and</strong> the applicationserver to the database server.To get the most out of this chapter:● Read Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures.” This will give you a betterunderst<strong>and</strong>ing of potential threats to <strong>Web</strong> applications.● Use the companion securing chapters. The current chapter is part of a securingsolution that includes chapters that cover host (operating system) <strong>and</strong> networklayer security. Use the following chapters in t<strong>and</strong>em with this one:●●●Chapter 15, “Securing Your Network”Chapter 16, “Securing Your <strong>Web</strong> Server”Chapter 18, “Securing Your Database Server”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!