11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22Deployment ReviewIn This Chapter●●●●●●●OverviewReviewing network <strong>and</strong> host configurationReviewing base Windows 2000 configurationReviewing IIS <strong>and</strong> .NET Framework configurationReviewing <strong>Web</strong> application <strong>and</strong> <strong>Web</strong> service configurationReviewing Enterprise Services configurationReviewing Remoting configurationReviewing SQL Server configuration<strong>Web</strong> application security is dependent upon the security of the underlyinginfrastructure on which the application is deployed. Weak network or hostconfiguration settings result in vulnerabilities that can <strong>and</strong> will be exploited. Thedeployment review covered in this chapter inspects the configuration of the network<strong>and</strong> host. The host includes Windows 2000 Server <strong>and</strong>, depending on the server role,it can also include IIS, the Microsoft .NET Framework, Enterprise Services, <strong>and</strong> SQLServer.The main configuration elements that are subject to the deployment review processare shown in Figure 22.1.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!