11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

644 Part V: Assessing Your <strong>Security</strong><strong>Web</strong> Server<strong>Application</strong> ServerDatabase Server.NETFrameworkIIS<strong>Web</strong>ServicesEnterpriseServicesRemotingShares Auditing <strong>and</strong> Logging Registry PortsFiles <strong>and</strong> Directories Accounts Protocols ServicesSQLServerWindows2000Patches <strong>and</strong> UpdatesRouters Firewalls SwitchesNetworkFigure 22.1Core elements of a deployment review<strong>Web</strong> Server ConfigurationThe goal for this phase of the review is to identify vulnerabilities in theconfiguration of the base operating system on your <strong>Web</strong> server. This does not includeIIS configuration, which is dealt with separately. For further background informationabout the issues raised by the review questions in this section, see Chapter 16,“Securing Your <strong>Web</strong> Server.”To help focus <strong>and</strong> structure the review process, the review questions have beendivided into the following configuration categories:● Patches <strong>and</strong> updates● Services● Protocols● Accounts● Files <strong>and</strong> directories● Shares● Ports● Registry● Auditing <strong>and</strong> logging

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!