11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

680 Part V: Assessing Your <strong>Security</strong>SummaryWhen you perform a deployment review, make sure that you review theconfiguration of the underlying infrastructure on which the application is deployed<strong>and</strong> the configuration of the application itself. Review the network, host, <strong>and</strong>application configuration <strong>and</strong>, where possible, involve members of the various teamsincluding infrastructure specialists, administrators <strong>and</strong> developers.Use the configuration categories identified in this chapter to help focus the review.These categories include patches <strong>and</strong> updates, services, protocols, accounts, files <strong>and</strong>directories, shares, ports, registry, <strong>and</strong> auditing <strong>and</strong> logging.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!