11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index of ChecklistsOverview<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures provides a series ofchecklists that help you turn the information <strong>and</strong> details that you learned in theindividual chapters into action. The following checklists are included:● Checklist: Architecture <strong>and</strong> Design Review● Checklist: Securing ASP.NET● Checklist: Securing <strong>Web</strong> Services● Checklist: Securing Enterprise Services● Checklist: Securing Remoting● Checklist: Securing Data Access● Checklist: Securing Your Network● Checklist: Securing Your <strong>Web</strong> Server● Checklist: Securing Your Database Server● Checklist: <strong>Security</strong> Review for Managed CodeDesigning ChecklistChecklist: Architecture <strong>and</strong> Design Review covers aspects of the architecture <strong>and</strong>design stages of the project life cycle, including: input validation, authentication,authorization, configuration management, sensitive data, session management,cryptography, parameter manipulation, exception management, <strong>and</strong> auditing <strong>and</strong>logging.Building ChecklistsEach checklist in the building series covers the following application categories: inputvalidation, authentication, authorization, configuration management, sensitive data,session management, cryptography, parameter manipulation, exceptionmanagement, <strong>and</strong> auditing <strong>and</strong> logging. These checklists are:● Checklist: Securing ASP.NET● Checklist: Securing <strong>Web</strong> Services● Checklist: Securing Enterprise Services● Checklist: Securing Remoting● Checklist: Securing Data Access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!