11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

lxxxii<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresImplementing the GuidanceThe guidance throughout the guide is task-based <strong>and</strong> modular, <strong>and</strong> each chapterrelates to the various stages of the product development life cycle <strong>and</strong> the variousroles involved. These roles include architects, developers, system administrators,<strong>and</strong> security professionals. You can pick specific chapters to perform a particulartask or use a series of chapters for a phase of the product development life cycle.The checklist shown in Table 3 highlights the areas covered by this guide that arerequired to secure your network, host, <strong>and</strong> application.Table 3 <strong>Security</strong> ChecklistCheck DescriptionEducate your teams about the threats that affect the network, host, <strong>and</strong> applicationlayers. Identify common vulnerabilities <strong>and</strong> attacks, <strong>and</strong> learn countermeasures. For moreinformation, see Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures.”Create threat models for your <strong>Web</strong> applications. For more information, see Chapter 3,“Threat Modeling.”Review <strong>and</strong> implement your company’s security policies. If you do not have securitypolicies in place, create them. For more information about creating security policies, see“<strong>Security</strong> Policy Issues” at the SANS Info Sec Reading Room at http://www.sans.org/rr/catindex.php?cat_id=50.Review your network security. For more information, see Chapter 15, “Securing YourNetwork.”Patch <strong>and</strong> update your servers. Review your server security settings <strong>and</strong> compare themwith the snapshot of a secure server. For more information, see “Snapshot of a Secure<strong>Web</strong> Server” in Chapter 16, “Securing Your <strong>Web</strong> Server.”Educate your architects <strong>and</strong> developers about <strong>Web</strong> application security design guidelines<strong>and</strong> principles. For more information, see Chapter 4, “Design Guidelines for Secure <strong>Web</strong><strong>Application</strong>s.”Educate your architects <strong>and</strong> developers about writing secure managed code. For moreinformation, see Chapter 7, “Building Secure Assemblies” <strong>and</strong> Chapter 8, “Code Access<strong>Security</strong> in Practice.”Secure your developer workstations. For more information, see “How To: Secure YourDeveloper Workstation” in the “How To” section of this guide.Review the designs of new <strong>Web</strong> applications <strong>and</strong> of existing applications. For moreinformation, see Chapter 5, “Architecture <strong>and</strong> Design Review for <strong>Security</strong>.”Educate developers about how to perform code reviews. Perform code reviews forapplications in development. For more information, see Chapter 21, “Code Review.”Perform deployment reviews of your applications to identify potential securityvulnerabilities. For more information, see Chapter 22, “Deployment Review.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!