11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

602 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>SummaryIf you host multiple ASP.NET applications on a single <strong>Web</strong> server, you need toconsider how applications are isolated from one another <strong>and</strong> from shared systemresources such as the file system, registry, <strong>and</strong> event logs. Without adequate isolation,a rogue or badly developed application can adversely affect other applications on theserver.On Windows Server 2003, use the multiple worker process model supported by IIS 6to provide operating system process isolation for applications. On Windows 2000,process isolation is not possible, although multiple applications can be configured touse separate anonymous user accounts. This provides separate application auditing<strong>and</strong> supports independent application authorization.On both platforms you can use the resource constraint model provided by codeaccess security as an additional control to restrict which applications have access towhich resource types. The use of code access security with ASP.NET applicationsrequires version 1.1 of the .NET Framework.For more information about securing ASP.NET applications, see Chapter 19,“Securing Your ASP.NET <strong>Application</strong>s <strong>and</strong> <strong>Web</strong> Services.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!