11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

714 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresAuthenticationCheck DescriptionAnonymous authentication is disabled in IIS.ASP.NET is configured for Windows authentication.Client credentials are configured at the client through the proxy object.Authentication connection sharing is used to improve performance.Clients are forced to authenticate on each call (unsafeAuthenticatedConnectionSharing isset to “false”).connectionGroupName is specified to prevent unwanted reuse of authenticationconnections.Plain text credentials are not passed over the network.IPrincipal objects passed from the client are not trusted.AuthorizationCheck DescriptionIPSec is used for machine-level access control.File authorization is enabled for user access control.Users are authorized with principal-based role checks.Where appropriate, access to remote resources is restricted by settingrejectRemoteRequest attribute to “true”.Configuration ManagementCheck DescriptionConfiguration files are locked down <strong>and</strong> secured for both the client <strong>and</strong> the server.Generic error messages are sent to the client by setting the mode attribute of the element to “On”.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!