11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

698 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresSensitive DataCheck DescriptionSSL is used to protect sensitive data on the wire.Sensitive data is not passed across pages; it is maintained using server-side statemanagement.Sensitive data is not stored in cookies, hidden form fields, or query strings.Do not cache sensitive data. Output caching is off by default.Plain text passwords are avoided in <strong>Web</strong>.config <strong>and</strong> Machine.config files. (Aspnet_setreg.exeis used to encrypt credentials.)Session ManagementCheck DescriptionThe session cookie is protected using SSL on all pages that require authenticated access.The session state service is disabled if not used.The session state service (if used) runs using a least-privileged account.Windows authentication is used to connect to Microsoft®SQL Server state database.Access to state data in the SQL Server is restricted.Connection strings are encrypted by using Aspnet_setreg.exe.The communication channel to state store is encrypted (IPSec or SSL).Parameter ManipulationCheck DescriptionView state is protected using message authentication codes (MACs).Query strings with server secrets are hashed.All input parameters are validated.Page.ViewStateUserKey is used to counter one-click attacks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!