11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solutions at a GlanceThis document roadmap summarizes the solutions presented in <strong>Improving</strong> <strong>Web</strong><strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures. It provides links to the appropriatematerial in the guide so that you can easily locate the information you need <strong>and</strong> findsolutions to specific problems.Architecture <strong>and</strong> Design SolutionsFor architects, the guide provides the following solutions to help you design secure<strong>Web</strong> applications:● How to identify <strong>and</strong> evaluate threatsUse threat modeling to systematically identify threats rather than applyingsecurity in a haphazard manner. Next, rate the threats based on the risk of anattack or occurrence of a security compromise <strong>and</strong> the potential damage that couldresult. This allows you to tackle threats in the appropriate order.For more information about creating a threat model <strong>and</strong> evaluating threat risks,see Chapter 3, “Threat Modeling.”● How to create secure designsUse tried <strong>and</strong> tested design principles. Focus on the critical areas where the correctapproach is essential <strong>and</strong> where mistakes are often made. This guide refers tothese as application vulnerability categories. They include input validation,authentication, authorization, configuration management, sensitive dataprotection, session management, cryptography, parameter manipulation,exception management, <strong>and</strong> auditing <strong>and</strong> logging considerations. Pay seriousattention to deployment issues including topologies, network infrastructure,security policies, <strong>and</strong> procedures.For more information, see Chapter 4, “Design Guidelines for Secure <strong>Web</strong><strong>Application</strong>s.”● How to perform an architecture <strong>and</strong> design reviewReview your application’s design in relation to the target deploymentenvironment <strong>and</strong> associated security policies. Consider the restrictions imposedby the underlying infrastructure layer security, including perimeter networks,firewalls, remote application servers, <strong>and</strong> so on. Use application vulnerabilitycategories to help partition your application, <strong>and</strong> analyze the approach taken foreach area.For more information, see Chapter 5, “Architecture <strong>and</strong> Design Review for<strong>Security</strong>.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!