11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents ixStep 3. Decompose the <strong>Application</strong>............................................................................ 52Identify Trust Boundaries ....................................................................................... 53Identify Data Flow ................................................................................................. 53Identify Entry Points .............................................................................................. 54Identify Privileged Code ......................................................................................... 54Document the <strong>Security</strong> Profile ................................................................................ 55Step 4. Identify the <strong>Threats</strong> ....................................................................................... 56Identify Network <strong>Threats</strong>........................................................................................ 57Identify Host <strong>Threats</strong>............................................................................................. 58Identify <strong>Application</strong> <strong>Threats</strong>.................................................................................... 58Using Attack Trees <strong>and</strong> Attack Patterns................................................................... 59Step 5. Document the <strong>Threats</strong> ................................................................................... 62Step 6. Rate the <strong>Threats</strong> ........................................................................................... 62Risk = Probability * Damage Potential .................................................................... 63High, Medium, <strong>and</strong> Low Ratings ............................................................................. 63DREAD ................................................................................................................. 63What Comes After Threat Modeling?........................................................................... 65Generating a Work Item Report .............................................................................. 66Summary ................................................................................................................. 66Additional Resources ................................................................................................ 66Part IIDesigning Secure <strong>Web</strong> <strong>Application</strong>s 67Chapter 4Design Guidelines for Secure <strong>Web</strong> <strong>Application</strong>s 69In This Chapter ......................................................................................................... 69Overview .................................................................................................................. 69How to Use This Chapter ........................................................................................... 70Architecture <strong>and</strong> Design Issues for <strong>Web</strong> <strong>Application</strong>s ................................................... 70Deployment Considerations ....................................................................................... 72<strong>Security</strong> Policies <strong>and</strong> Procedures............................................................................ 73Network Infrastructure Components ....................................................................... 73Deployment Topologies.......................................................................................... 73Intranet, Extranet, <strong>and</strong> Internet............................................................................... 74Input Validation......................................................................................................... 74Assume All Input Is Malicious ................................................................................ 75Centralize Your Approach ....................................................................................... 75Do Not Rely on Client-Side Validation...................................................................... 76Be Careful with Canonicalization Issues.................................................................. 76Constrain, Reject, <strong>and</strong> Sanitize Your Input ............................................................... 77In Practice............................................................................................................ 79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!