Improving Web Application Security: Threats and Countermeasures

If your application provides an administration interface that allows it to be configured, examine how the administration interfaces are secured. Also examine how sensitive configuration data is secured. Table 5.4 shows the most common configuration management vulnerabilities.

Table 5.4: Common Configuration Management Vulnerabilities

Vulnerability

Implications

Insecure administration interfaces

Unauthorized users can reconfigure your application and access sensitive data.

Insecure configuration stores

Unauthorized users can access configuration stores and obtain secrets, such as account names and passwords, and database connection details.

Clear text configuration data

Anyone that can log in to the server can view sensitive configuration data.

Too many administrators

This makes it difficult to audit and vet administrators.

Over-privileged process accounts and service accounts

This can allow privilege escalation attacks.

Use the following questions to help validate the approach of your application design to configuration management:

Do You Support Remote Administration?

If your design specifies remote administration, then you must secure the administration interfaces and configuration stores because of the sensitive nature of the operations and the data that is accessible over the administration interface. Review the following aspects of your remote administration design:

Do You Secure Configuration Stores?

Identify the configuration stores of your application and then examine your approach to restricting access to the stores and securing the data inside the stores.

Do You Separate Administrator Privileges?

If your administration interfaces support different functionalities ” for example, site content updates, service account reconfiguration, and database connection details ” verify that your administration interfaces support role-based authorization to differentiate between content developers and operators or system administrators. For example, the person who updates static Web site content should not necessarily be allowed to alter the credit limit of a customer or reconfigure a database connection string.

Категории