11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checklist:Securing Enterprise ServicesHow to Use This ChecklistThis checklist is a companion to Chapter 11, “Building Secure Serviced Components”<strong>and</strong> Chapter 17, “Securing Your <strong>Application</strong> Server.” Use it to help you secureEnterprise Services <strong>and</strong> the server it runs on, or as a quick evaluation snapshot of thecorresponding chapters.This checklist should evolve with steps that you discover to secure EnterpriseServices.Developer ChecksUse the following checks if you build serviced components.AuthenticationCheck DescriptionCall-level authentication is used at minimum to prevent anonymous access. Servicedcomponent assemblies include:[assembly: <strong>Application</strong>AccessControl(Authentication = AuthenticationOption.Call)]AuthorizationCheck DescriptionRole-based security is enabled. Serviced component assemblies include: [assembly:<strong>Application</strong>AccessControl(true)]Component-level access checks are enabled to support component-level, interface-level, <strong>and</strong>method-level role checks. Serviced component assemblies include:[assembly: <strong>Application</strong>AccessControl(AccessChecksLevel=AccessChecksLevelOption.<strong>Application</strong>Component)](continued)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!