11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

664 Part V: Assessing Your <strong>Security</strong>Use the following questions to help review the security configuration of your<strong>Web</strong> service:● Have you disabled the Documentation protocol?If you do not want to expose your <strong>Web</strong> services endpoints, then you can removethe Documentation protocol from the element in Machine.config <strong>and</strong>manually distribute the .<strong>Web</strong> Services Description Language (WSDL) file tospecific <strong>Web</strong> service consumers.● Have you disabled the HTTP Get <strong>and</strong> Post protocols?By disabling (commenting) HttpGet <strong>and</strong> HttpPost protocols from element in Machine.config file, you help to reduce the attack profile for your <strong>Web</strong>services.● Do you restrict access to WSDL?If you store the generated .WSDL files on the <strong>Web</strong> server to distribute them to theconsumers, make sure that the files are protected by an appropriate ACL. Thisprevents a malicious user from updating or replacing the WSDL so that it pointsto endpoints that differ from the intended URL.● Do you pass sensitive data in SOAP requests or responses?If your <strong>Web</strong> service h<strong>and</strong>les sensitive data, how do you protect the data over thenetwork <strong>and</strong> address the network eavesdropping threat? Do you use SSL or IPSecencrypted channels, or do you encrypt parts of the message by using XMLencryption?● How do you authenticate callers?If your <strong>Web</strong> service exposes restricted operations or data, it needs to authenticatecallers to support authorization. Review how the <strong>Web</strong> service authenticates itsclients.● Do you pass credentials in SOAP headers?If you pass credentials in SOAP headers, are they passed in plaintext? If they are,make sure an encrypted channel is used.Enterprise ServicesThis section identifies the key review points that should be considered when youreview your Enterprise Services applications <strong>and</strong> components. For more informationabout the issues raised in this section, see Chapter 17, “Securing Your <strong>Application</strong>Server.”When you review Enterprise Services applications consider the following issues:● Accounts● Files <strong>and</strong> directories● Authentication● Authorization● Remote serviced component

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!