11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Fast Track — How To Implementthe GuidanceGoal <strong>and</strong> ScopeThis guide helps you to design, build, <strong>and</strong> configure hack-resilient <strong>Web</strong> applications.These applications reduce the likelihood of successful attacks <strong>and</strong> mitigate the extentof damage should an attack occur. Figure 1 shows the scope of the guide <strong>and</strong> itsthree-layered approach: securing the network, securing the host, <strong>and</strong> securing theapplication.<strong>Web</strong>ServerSecuring the <strong>Application</strong>Input validationAuthenticationAuthorizationConfiguration ManagementSensitive DataSession ManagementCryptographyParameter ManipulationException ManagementAuditing <strong>and</strong> Logging<strong>Application</strong>ServerDatabaseServerFirewallAppsHostFirewallAppsHostDatabaseHostSecuring theNetworkRouterFirewallSwitchPatches <strong>and</strong>UpdatesServicesProtocolsSecuring the HostAccountsFiles <strong>and</strong> DirectoriesSharesPortsRegistryAuditing <strong>and</strong> Logging<strong>Threats</strong> <strong>and</strong> CountermeasuresFigure 1The scope of the guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!