11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Checklist: Architecture <strong>and</strong> Design Review 691Authentication (continued)Check DescriptionThe design identifies the mechanisms to protect the credentials over the wire (SSL, IPSec,encryption <strong>and</strong> so on).Account management policies are taken into consideration by the design.The design ensure that minimum error information is returned in the event of authenticationfailure.The identity that is used to authenticate with the database is identified by the design.If SQL authentication is used, credentials are adequately secured over the wire (SSL orIPSec) <strong>and</strong> in storage (DPAPI).The design adopts a policy of using least-privileged accounts.Password digests (with salt) are stored in the user store for verification.Strong passwords are used.Authentication tickets (cookies) are not transmitted over non-encrypted connections.AuthorizationCheck DescriptionThe role design offers sufficient separation of privileges (the design considers authorizationgranularity).Multiple gatekeepers are used for defense in depth.The application’s login is restricted in the database to access-specific stored procedures.The application’s login does not have permissions to access tables directly.Access to system level resources is restricted.The design identifies code access security requirements. Privileged resources <strong>and</strong> privilegedoperations are identified.All identities that are used by the application are identified <strong>and</strong> the resources accessed byeach identity are known.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!