11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Checklist:Securing Data AccessHow to Use This ChecklistThis checklist is a companion to Chapter 14, “Building Secure Data Access” <strong>and</strong>Chapter 16, “Securing Your Database Server.” Use it to help you build secure dataaccess, or as a quick evaluation snapshot of the corresponding chapters.This checklist should evolve with secure data access practices that you discoverduring software development.SQL Injection ChecksCheck DescriptionInput passed to data access methods that originates outside the current trust boundary isconstrained.Sanitization of input is only used as a defense in depth measure.Stored procedures that accept parameters are used by data access code. If storedprocedures are not used, type safe SQL parameters are used to construct SQL comm<strong>and</strong>s.Least-privileged accounts are used to connect to the database.AuthenticationCheck DescriptionWindows authentication is used to connect to the database.Strong passwords are used <strong>and</strong> enforced.If SQL Server authentication is used, the credentials are secured over the network by usingIPSec or SSL, or by installing a database server certificate.If SQL Server authentication is used, connection strings are encrypted by using DPAPI <strong>and</strong>are stored in a secure location.<strong>Application</strong> connects using a least-privileged account. The sa account or other privilegedaccounts that are members of the sysadmin or db_owner roles are not used for applicationlogins.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!