11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

lxxvi<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresThe guide addresses security across the three physical tiers shown in Figure 1.It covers the <strong>Web</strong> server, remote application server, <strong>and</strong> database server. At each tier,security is addressed at the network layer, host layer, <strong>and</strong> application layer. Figure 1also shows the configuration categories that the guide uses to organize the varioussecurity configuration settings that apply to the host <strong>and</strong> network, <strong>and</strong> theapplication vulnerability categories, which are used to structure application securityconsiderations.The Holistic Approach<strong>Web</strong> application security must be addressed across application tiers <strong>and</strong> at multiplelayers. An attacker can exploit weaknesses at any layer. For this reason, the guidetakes a holistic approach to application security <strong>and</strong> applies it at all three layers.This holistic approach to security is shown in Figure 2.Secure the NetworkSecure the HostSecure the <strong>Application</strong>PresentationLogicBusinessLogicData AccessLogicRuntime Services <strong>and</strong> ComponentsPlatform Services <strong>and</strong> ComponentsOperating SystemFigure 2A holistic approach to security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!