11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

694 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresAuditing <strong>and</strong> LoggingCheck DescriptionThe design identifies the level of auditing <strong>and</strong> logging necessary for the application <strong>and</strong>identifies the key parameters to be logged <strong>and</strong> audited.The design considers how to flow caller identity across multiple tiers (at the operatingsystem or application level) for auditing.The design identifies the storage, security, <strong>and</strong> analysis of the application log files.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!