11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lxx<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresAdministration SolutionsFor administrators, this guide provides the following solutions:● How to implement patch managementUse the Microsoft Baseline <strong>Security</strong> Analyzer (MBSA) to detect the patches <strong>and</strong>updates that may be missing from your current installation. Run this on a regularbasis, <strong>and</strong> keep your servers current with the latest patches <strong>and</strong> updates. Backup servers prior to applying patches, <strong>and</strong> test patches on test servers prior toinstalling them on a production server. Also, use the security notification servicesprovided by Microsoft, <strong>and</strong> subscribe to receive security bulletins via e-mail.For more information, see “How To: Implement Patch Management” in the“How To” section of this guide.● How to make the settings in Machine.config <strong>and</strong> <strong>Web</strong>.config more secureDo not store passwords or sensitive data in plaintext. For example, use theAspnet_setreg.exe utility to encrypt the values for , ,<strong>and</strong> . Do not reveal exception details to the client. For example donot use mode=“Off” for in ASP.NET because it causes detailederror pages that contain system-level information to be returned to the client.Restrict who has access to configuration files <strong>and</strong> settings. Lock configurationsettings if necessary, using the tag <strong>and</strong> the allowOverride element.For more information on improving the security of Machine.config <strong>and</strong><strong>Web</strong>.config for your scenario, see Chapter 19, “Securing Your ASP.NET<strong>Application</strong> <strong>and</strong> <strong>Web</strong> Services.” For more information on the tag,see “Machine.Config <strong>and</strong> <strong>Web</strong>.Config” explained in Chapter 19, “SecuringYour ASP.NET <strong>Application</strong> <strong>and</strong> <strong>Web</strong> Services.” For more information onAspnet_setreg.exe, see “Aspnet_setreg.exe <strong>and</strong> Process, Session, <strong>and</strong> Identity”in Chapter 19, “Securing Your ASP.NET <strong>Application</strong> <strong>and</strong> <strong>Web</strong> Services.”● How to secure a <strong>Web</strong> server running the .NET FrameworkApply a methodology to systematically configure the security of your <strong>Web</strong> server.Secure your accounts, protocols, ports, services, shares, files <strong>and</strong> directories, <strong>and</strong>registry. You can use IISLockdown to help automate some of the securityconfiguration. Use a hardened Machine.config configuration to apply stringentsecurity to all .NET Framework applications installed on the server. Mostimportantly, keep your server current with the latest patches <strong>and</strong> updates.For more information, see Chapter 16, “Securing Your <strong>Web</strong> Server.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!