11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checklist:Architecture <strong>and</strong> Design ReviewHow to Use This ChecklistThis checklist is a companion to Chapter 4, “Design Guidelines for Secure <strong>Web</strong><strong>Application</strong>s,” <strong>and</strong> Chapter 5, “Architecture <strong>and</strong> Design Review for <strong>Security</strong>.” Use itto help you perform architecture <strong>and</strong> design reviews to evaluate the security of your<strong>Web</strong> applications <strong>and</strong> to implement the design guidelines in Chapter 4.This checklist should evolve based on the experience you gain from performingreviews. You might also want to perform custom checks that are based on a specificaspect of your architecture or design to ensure that your deployment environmentthe design.Deployment <strong>and</strong> Infrastructure ConsiderationsCheck DescriptionThe design identifies, underst<strong>and</strong>s, <strong>and</strong> accommodates the company security policy.Restrictions imposed by infrastructure security (including available services, protocols, <strong>and</strong>firewall restrictions) are identified.The design recognizes <strong>and</strong> accomodates restrictions imposed by hosting environments(including application isolation requirements).The target environment code-access-security trust level is known.The design identifies the deployment infrastructure requirements <strong>and</strong> the deploymentconfiguration of the application.Domain structures, remote application servers, <strong>and</strong> database servers are identified.The design identifies clustering requirements.The design identifies the application configuration maintenance points (such as what needsto be configured <strong>and</strong> what tools are available for an IDC admin).Secure communication features provided by the platform <strong>and</strong> the application are known.The design addresses <strong>Web</strong> farm considerations (including session state management,machine specific encryption keys, Secure Sockets Layer (SSL), certificate deploymentissues, <strong>and</strong> roaming profiles).The design identifies the certificate authority (CA) to be used by the site to support SSL.The design addresses the required scalability <strong>and</strong> performance criteria.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!