Improving Web Application Security: Threats and Countermeasures

Examine how your application uses auditing and logging. Besides preventing repudiation issues, regular log file analysis helps identify signs of intrusion. Table 5.10 shows the most common auditing and logging vulnerabilities.

Table 5.10: Common Auditing and Logging Vulnerabilities

Vulnerability

Implications

Failing to audit failed logons

Attempted break-ins go undetected.

Failing to secure audit files

An attacker can cover his or her tracks.

Failing to audit across application tiers

The threat of repudiation increases .

Review the following questions to help verify the approach to auditing and logging by your application:

Have You Identified Key Activities to Audit?

Your design should define which activities should be audited . Consider the following:

Have You Considered How to Flow Original Caller Identity?

Your design should ensure that activity is audited across multiple application tiers. To do so, the identity of the original caller must be available at each tier .

Have You Considered Secure Log File Management Policies?

Check whether your application design factors in how log files are backed up, archived, and analyzed. Log files should be archived regularly to ensure that they do not fill up or start to cycle, and they should be regularly analyzed to detect signs of intrusion. Also ensure that any accounts used to perform the backup are least privileged and that you secure any additional communication channels exposed purely for the purpose of the backup.

Категории