11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

732 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresAuditing <strong>and</strong> LoggingCheck DescriptionAll failed Windows login attempts are logged.All failed actions are logged across the file system.SQL Server login auditing is enabled.Log files are relocated from the default location <strong>and</strong> secured with access control lists.Log files are configured with an appropriate size depending on the application securityrequirement.Where the database contents are highly sensitive or vital, Windows is set to Shut Downmode on overflow of the security logs.SQL Server <strong>Security</strong>Check DescriptionSQL Server authentication is set to Windows only (if supported by the application).The SQL Server audit level is set to Failure or All.SQL Server runs using a least-privileged account.SQL Server Logins, Users, <strong>and</strong> RolesCheck DescriptionA strong sa password is used (for all accounts).SQL Server guest user accounts are removed.BUILTIN\Administrators server login is removed.Permissions are not granted for the public role.Members of sysadmin fixed server role are limited (ideally, no more than two users).Restricted database permissions are granted. Use of built-in roles, such as db_datareader<strong>and</strong> db_datawriter, are avoided because they provide limited authorization granularity.Default permissions that are applied to SQL Server objects are not altered.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!