11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Fast Track — How To Implement the Guidance lxxixTable 2 <strong>Application</strong> Vulnerability Categories (continued)CategoryDescriptionSensitive DataSensitive data is information that must be protected either in memory,over the wire, or in persistent stores. Your application must have aprocess for h<strong>and</strong>ling sensitive data.Session ManagementCryptographyParameter ManipulationException ManagementAuditing <strong>and</strong> LoggingA session refers to a series of related interactions between a user <strong>and</strong>your <strong>Web</strong> application. Session management refers to how yourapplication h<strong>and</strong>les <strong>and</strong> protects these interactions.How are you protecting secret information (confidentiality)? How are youtamperproofing your data or libraries (integrity)? How are you providingseeds for r<strong>and</strong>om values that must be cryptographically strong?Cryptography refers to how your application enforces confidentiality <strong>and</strong>integrity.Form fields, query string arguments, <strong>and</strong> cookie values are frequentlyused as parameters for your application. Parameter manipulation refersto both how your application safeguards tampering of these values <strong>and</strong>how your application processes input parameters.When a method call in your application fails, what does your applicationdo? How much does it reveal about the failure condition? Do you returnfriendly error information to end users? Do you pass valuable exceptioninformation back to the caller? Does your application fail gracefully?Who did what <strong>and</strong> when? Auditing <strong>and</strong> logging refer to how yourapplication records security-related events.Identify <strong>Threats</strong>You need to know your threats before you can successfully apply security measures.<strong>Threats</strong> can be external, such as from an attacker on the Internet, or internal — forexample, from a disgruntled employee or administrator. This guide helps you toidentify threats in two ways:● It lists the top threats that affect <strong>Web</strong> applications at the network, host, <strong>and</strong>application layers.● It presents a threat modeling process to help you identify which threats arerelevant to your application.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!