11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lxxviii<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresFigure 3 shows the configuration categories used throughout Part IV of this guide,“Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>.”Operating SystemSharesServicesAccountsAuditing <strong>and</strong>LoggingFiles <strong>and</strong>DirectoriesRegistryPatches <strong>and</strong> UpdatesNetworkProtocolsPortsFigure 3Host security categoriesSecuring Your <strong>Application</strong>The guide defines a set of application vulnerability categories to help you design<strong>and</strong> build secure <strong>Web</strong> applications <strong>and</strong> evaluate the security of existing applications.These are common categories that span multiple technologies <strong>and</strong> components in alayered architecture. These categories are the focus for discussion through thedesigning, building, <strong>and</strong> security assessment chapters in this guide.Table 2 <strong>Application</strong> Vulnerability CategoriesCategoryDescriptionInput ValidationHow do you know that the input your application receives is valid <strong>and</strong>safe? Input validation refers to how your application filters, scrubs, orrejects input before additional processing.AuthenticationAuthorizationConfigurationManagementWho are you? Authentication is the process that an entity uses toidentify another entity, typically through credentials such as a user name<strong>and</strong> password.What can you do? Authorization is the process that an application usesto control access to resources <strong>and</strong> operations.Who does your application run as? Which databases does it connect to?How is your application administered? How are these settings secured?Configuration management refers to how your application h<strong>and</strong>les theseoperational issues.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!