Design Specifications for Web Security (4.1)

Source: Internet
Author: User

Main Content

    • Enter check Policy
    • Separate restricted access
    • Effective account management practices
    • Effective authorization and verification policy development
    • Protect sensitive data
    • Protect user sessions
    • Parameter manipulation)
    • Security handling exception
    • Protection configuration and management
    • Monitoring and logging considerations

Overview

Many Web applications require architects, designers,ProgramSecurity issues. Almost all secure web applications are the result of both the above-mentioned efforts on security.

In addition, reliable architecture and design require that deployment and security policies be considered at the initial stage of the design phase. Otherwise, you may not be able to deploy on an existing infrastructure or deploy it only when the security level is reduced.

This chapter includes a series of architectural and design specifications. And are classified according to common security weaknesses. The Web security design specifications are not only the key to Web security, but also the areas that often make mistakes.

How to Apply

This chapter focuses on the principles and specifications that must be followed when designing applications. The following are the suggestions for using this chapter.

    • First, you must know the threats to the application so that you can determine whether all threats are taken into account during design. Read chapter 2 "Threats and Countermeasures" to understand the threats to be considered. Chapter 2 illustrates the threats that may endanger applications. You should keep these risks in mind throughout the design phase.
    • When designing an application, the system processes your possibly attacked part. This includes deployment considerations, input verification, user authentication and authorization, encryption and sensitive data protection, management and configuration, sesion, exception handling, monitoring, and logs.

Key Points of architecture and design in Web Applications

Web applications are a challenge for designers and programmers. Because the HTTP division is stateless, the application must be able to identify the connection information of each user. To do this, the application must implement some form of user authentication. Subsequent user authorization decisions are also based on user authentication, which essentially requires that the authentication process be consistent with the security requirements of the session mechanism used to mark authorized users. Verification and Session Security are one of the many problems that designers and programmers need to face. In illustration 4.1, the important issues that must be addressed during the design process are highlighted.

The design specifications in this chapter are categorized according to the weak links in the application. Based on past experience, the design deficiencies in these key areas are more likely to bring security vulnerabilities. Table 4.1 lists the categories of weak links and identifies possible problems caused by improper handling of each weak link.

 

Deployment considerations

During the design process, you should assess the coordination between the application security policy and the target deployment environment infrastructure of the application. Generally, the target environment is rigid, so the application design must consider the environmental restrictions. Sometimes it is necessary to make some trade-offs on the design and infrastructure, such as protocol and port restrictions or special deployment technologies. Identifying limitations at the beginning of the design phase can avoid major troubles in the later stage. In addition, you can get help from the network and infrastructure teams as soon as possible.

Design Guidelines for Secure Web Applications

Dizzy. It took more than two hours. Tired. I will go to work tomorrow...

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.