11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

544 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>This chapter describes what is new with ASP.NET from a system administrator’sst<strong>and</strong>point <strong>and</strong> how to configure machine-wide <strong>and</strong> application-specific securitysettings.How to Use This ChapterThis chapter focuses on the key security considerations for ASP.NET applications.To get the most out of this chapter:● Read Chapter 16, “Securing Your <strong>Web</strong> Server.” This shows you how to secure theWindows 2000 operating system <strong>and</strong> the Microsoft .NET Framework. A secureunderlying platform is a prerequisite for securing an ASP.NET <strong>Web</strong> application or<strong>Web</strong> service.● Use the snapshot. Table 19.4, which is at the end of this chapter, gives a snapshotof a secure ASP.NET application with secure configuration settings inMachine.config <strong>and</strong> <strong>Web</strong>.config. Use this table when configuring your server <strong>and</strong>application settings.● Use the checklist. The “Checklist: Securing Your ASP.NET <strong>Application</strong>” in the“Checklist” section of this guide provides a printable job aid for quick reference.Use the task-based checklist to quickly evaluate the scope of the required steps<strong>and</strong> to help you work through individual steps.For related guidance, read Chapter 20, “Hosting Multiple ASP.NET <strong>Application</strong>s,”which shows you how to isolate multiple <strong>Web</strong> applications running on the sameserver from critical system resources <strong>and</strong> from one another. For more informationabout configuring code access security (CAS) policy for partial-trust <strong>Web</strong> applications<strong>and</strong> <strong>Web</strong> services, see Chapter 9, “Using Code Access <strong>Security</strong> with ASP.NET.”MethodologyTo secure your ASP.NET application, start with a hardened operating system <strong>and</strong>.NET Framework installation base, <strong>and</strong> then apply secure application configurationsettings to reduce the application’s attack profile. The methodology that is applied inthis chapter to secure ASP.NET <strong>Web</strong> applications <strong>and</strong> <strong>Web</strong> services is consistent withthe methodology used to secure the underlying <strong>Web</strong> server host, <strong>and</strong> it sharescommon configuration categories. These include:● Services. The .NET Framework installs the ASP.NET state service to manage outof-processASP.NET session state. Secure the ASP.NET state service if you install it.Disable the ASP.NET state service if you do not require it.● Protocols. Restrict <strong>Web</strong> service protocols to reduce the attack surface area.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!