11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1: <strong>Web</strong> <strong>Application</strong> <strong>Security</strong> Fundamentals 9Table 1.2: Rationale for Host Configuration Categories (continued)CategoryDescriptionFiles <strong>and</strong> Directories Files <strong>and</strong> directories should be secured with restricted NTFS permissionsthat allow access only to the necessary Microsoft Windows service <strong>and</strong>user accounts.SharesPortsAuditing <strong>and</strong> LoggingRegistryAll unnecessary file shares, including the default administration shares ifthey are not required, should be removed. Secure the remaining shareswith restricted NTFS permissions.Services running on a server listen on specific ports to serve incomingrequests. Open ports on a server must be known <strong>and</strong> audited regularly tomake sure that an insecure service is not listening <strong>and</strong> available forcommunication. In the worst-case scenario, a listening port is detected thatwas not opened by an administrator.Auditing is a vital aid in identifying intruders or attacks in progress. Loggingproves particularly useful as forensic information when determining how anintrusion or attack was performed.Many security related settings are maintained in the registry. Secure theregistry itself by applying restricted Windows ACLs <strong>and</strong> blocking remoteregistry administration.Securing Your <strong>Application</strong>If you were to review <strong>and</strong> analyze the top security issues across many <strong>Web</strong>applications, you would see a pattern of problems. By organizing these problems intocategories, you can systematically tackle them. These problem areas are yourapplication’s vulnerability categories.<strong>Application</strong> Vulnerability CategoriesWhat better way to measure the security of a system than to evaluate its potentialweak points? To measure the security resilience of your application, you can evaluatethe application vulnerability categories. When you do this, you can create applicationsecurity profiles, <strong>and</strong> then use these profiles to determine the security strength of anapplication.These categories are used as a framework throughout this guide. Because thecategories represent the areas where security mistakes are most frequently made,they are used to illustrate guidance for application developers <strong>and</strong> architects. Thecategories are also used as a framework when evaluating the security of a <strong>Web</strong>application. With these categories, you can focus consistently on the key design <strong>and</strong>implementation choices that most affect your application’s security. <strong>Application</strong>vulnerability categories are described in Table 1.3.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!