11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

502 Part IV: Securing Your Network, Host <strong>and</strong> <strong>Application</strong>How to Use This ChapterThis chapter provides a methodology <strong>and</strong> steps for securing a database server. Themethodology can be adapted for your own scenario. The steps put the methodologyinto practice.To gain the most from this chapter:● Read Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures.” This chapter provides anexplanation of potential threats faced by <strong>Web</strong> applications <strong>and</strong> downstreamdatabase servers.● Use the snapshot. The section, “Snapshot of a Secure Database Server,” later inthis chapter lists the attributes of a secure database server. It reflects distilled inputfrom a variety of sources including customers, industry experts, <strong>and</strong> internalMicrosoft development <strong>and</strong> support teams. Use the snapshot table as a referencewhen configuring your database server.● Use the checklist. The “Checklist: Securing Your Database Server” in the“Checklist” section of this guide provides a quick reference. Use the checklist toquickly evaluate the scope of the required steps <strong>and</strong> to help you work through theindividual steps.● Use the “How To” section. The “How To” section in this guide includes thefollowing instructional articles that help you implement the guidance in thischapter:● “How To: Use Microsoft <strong>Security</strong> Baseline Analyzer”● “How To: Use IPSec”● “How To: Implement Patch Management”<strong>Threats</strong> <strong>and</strong> CountermeasuresAn attacker can target <strong>and</strong> compromise a database server in a number of ways byexploiting a variety of configuration <strong>and</strong> application level vulnerabilities.The main threats to a database server are:● SQL injection● Network eavesdropping● Unauthorized server access● Password crackingFigure 18.1 shows the major threats <strong>and</strong> vulnerabilities that can result in acompromised database server <strong>and</strong> the potential destruction or theft of sensitive data.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!