11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checklist:Securing <strong>Web</strong> ServicesHow to Use This ChecklistThis checklist is a companion to Chapter 12, “Building Secure <strong>Web</strong> Services.” Use it tohelp you build <strong>and</strong> secure your <strong>Web</strong> services <strong>and</strong> also as a snapshot of thecorresponding chapter.Design ConsiderationsCheck DescriptionThe authentication strategy has been identified.Privacy <strong>and</strong> integrity requirements of SOAP messages have been considered.Identities that are used for resource access have been identified.Implications of code access security trust levels have been considered.Development ConsiderationsInput ValidationCheck DescriptionInput to <strong>Web</strong> methods is constrained <strong>and</strong> validated for type, length, format, <strong>and</strong> range.Input data sanitization is only performed in addition to constraining input data.XML input data is validated based on an agreed schema.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!