11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checklist: Architecture <strong>and</strong> Design Review 693CryptographyCheck DescriptionPlatform-level cryptography is used <strong>and</strong> it has no custom implementations.The design identifies the correct cryptographic algorithm (<strong>and</strong> key size) for the application’sdata encryption requirements.The methodology to secure the encryption keys is identified.The design identifies the key recycle policy for the application.Encryption keys are secured.DPAPI is used where possible to avoid key management issues.Keys are periodically recycled.Parameter ManipulationCheck DescriptionAll input parameters are validated (including form fields, query strings, cookies, <strong>and</strong> HTTPheaders).Cookies with sensitive data are encrypted.Sensitive data is not passed in query strings or form fields.HTTP header information is not relied on to make security decisions.View state is protected using MACs.Exception ManagementCheck DescriptionThe design outlines a st<strong>and</strong>ardized approach to structured exception h<strong>and</strong>ling across theapplication.<strong>Application</strong> exception h<strong>and</strong>ling minimizes the information disclosure in case of an exception.The design identifies generic error messages that are returned to the client.<strong>Application</strong> errors are logged to the error log.Private data (for example, passwords) is not logged.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!