11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

480 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>MethodologyBy securing the communication channels to the application server <strong>and</strong> preventingany hosts except authorized <strong>Web</strong> servers from accessing the application server,attackers are limited to application-layer attacks that exploit vulnerabilities in <strong>Web</strong>application design <strong>and</strong> development.To mitigate this risk, developers must apply the secure design <strong>and</strong> developmentapproaches described in Parts II <strong>and</strong> III of this guide.The configuration solutions in this chapter are specific to the application server <strong>and</strong>they should not be applied in isolation. Apply them alongside the solutions presentedin Chapter 15, “Securing Your Network,” Chapter 16, “Securing Your <strong>Web</strong> Server,”<strong>and</strong> Chapter 18, “Securing Your Database Server.”Communication Channel ConsiderationsSensitive application data <strong>and</strong> authentication credentials that are sent to <strong>and</strong> from theapplication server should be encrypted to provide privacy <strong>and</strong> integrity. Thismitigates the risk associated with eavesdropping <strong>and</strong> tampering.Encrypting network traffic addresses the network eavesdropping <strong>and</strong> tamperingthreats. If you consider this threat to be negligible in your environment — forexample, because your application is located in a closed <strong>and</strong> physically securednetwork — then you do not need to encrypt the traffic. If network eavesdropping is aconcern, then you can use SSL, which provides a secure communication channel atthe application layer, or IPSec, which provides a transport-level solution. IPSecencrypts all IP traffic that flows between two servers, while SSL allows eachapplication to choose whether or not to provide an encrypted communicationchannel.Enterprise ServicesEnterprise Services (or COM+) applications communicate over the network usingDCOM over RPC. RPC uses port 135, which provides endpoint mapping services toallow clients to negotiate parameters, including the communication port, which bydefault is dynamically assigned.The Enterprise Service channel can be secured in one of two ways:● RPC EncryptionYou can configure an Enterprise Services application for RPC Packet Privacyauthentication. In addition to authentication, this provides encryption for everydata packet sent to <strong>and</strong> from the Enterprise Services application.● IPSecYou can use an IPSec policy between the <strong>Web</strong> server <strong>and</strong> the application server toencrypt the communication channel.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!