11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

718 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresAuthorizationCheck DescriptionCalling users are restricted using declarative or imperative principal permission checks(normally performed by business logic).Calling code is restricted using identity permission dem<strong>and</strong>s in scenarios where you know<strong>and</strong> want to limit the calling code.<strong>Application</strong> login is restricted in the database <strong>and</strong> can only execute selected storedprocedures. <strong>Application</strong>’s login has no direct table access.Configuration ManagementCheck DescriptionWindows authentication is used to avoid credential management.Connection strings are encrypted <strong>and</strong> encrypted data is stored securely, for example, in arestricted registry key.OLE DB connection strings do not contain Persist <strong>Security</strong> Info=“true” or “yes”.UDL files are secured with restricted ACLs.Sensitive DataCheck DescriptionSensitive data is encrypted in the database using strong symmetric encryption (forexample, 3DES).Symmetric encryption keys are backed up <strong>and</strong> encrypted with DPAPI <strong>and</strong> stored in arestricted registry key.Sensitive data is secured over the network by using SSL or IPSec.Passwords are not stored in custom user store databases. Password hashes are storedwith salt values instead.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!