11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checklist:Securing RemotingHow to Use This ChecklistThis checklist is a companion to Chapter 13, “Building Secure RemotedComponents.” Use it to help you build secure components that use the Microsoft ®.NET remoting technology <strong>and</strong> as a snapshot of the corresponding chapter.Design ConsiderationsCheck DescriptionRemote components are not exposed to the Internet.The ASP.NET host <strong>and</strong> HttpChannel are used to take advantage of Internet InformationServices (IIS) <strong>and</strong> ASP.NET security features.TcpChannel (if used) is only used in trusted server scenarios.TcpChannel (if used) is used in conjunction with custom authentication <strong>and</strong> authorizationsolutions.Input ValidationCheck DescriptionMarshalByRefObj objects from clients are not accepted without validating the source of theobject.The risk of serialization attacks are mitigated by setting the typeFilterLevel attributeprogrammatically or in the application’s <strong>Web</strong>.config file.All field items that are retrieved from serialized data streams are validated as they arecreated on the server side.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!