1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Best Practices and Techniques for Building Secure Microsoft® ASP.NET Applications pdf

59 674 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Best Practices and Techniques for Building Secure Microsoft® ASP.NET Applications
Tác giả Joe Stagner
Trường học Microsoft Corporation
Chuyên ngành Web Application Security
Thể loại Báo cáo kỹ thuật
Định dạng
Số trang 59
Dung lượng 1,17 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Session PrerequisitesLevel 200 Familiarity with Microsoft ® Windows ® management tools Familiarity with IIS Management Console C# and ASP.NET coding experience Familiarity with Micro

Trang 1

Best Practices and

Techniques for Building

Secure Microsoft®

ASP.NET Applications

Trang 2

So Why This Presentation?

Web application security is more important than ever

Ensure that security is a consideration in application design

Creating secure Web applications is a series of complex tasks

Promote best techniques for security

Let developers know about new resources available

msdn.microsoft.com/library/en-us/dnnetsec/html/ThreatCounter.asp

Trang 3

What We Will Cover

Planning for Web application security

Authentication and authorization

Trang 4

Session Prerequisites

Level 200

Familiarity with Microsoft ® Windows ® management tools

Familiarity with IIS Management Console

C# and ASP.NET coding experience

Familiarity with Microsoft ® Visual Studio ® NET

Basic understanding of Web application security issues

Trang 5

Configuring IIS for SSL

Using forms authentication with

Microsoft ® SQL Server™

Creating a GenericPrincipal object for

roles-based authorization

Trang 6

Before We Start !

SSL IS NOT WEB APPLICATION

SECURITY

Trang 7

Required Reading

Trang 8

Secure Development

Trang 9

Securing state information

Securing all tiers

Trang 10

Planning for ASP.NET Web Application Security

Authentication and Authorization

Authentication / authorization request

flow

Trang 11

Planning for ASP.NET Web Application Security

Authentication and Authorization

Identify resources exposed to client

Identify resource for app

Choose authorization strategy

Trang 12

Planning for ASP.NET Web Application Security

Authentication and Authorization

Choose Identities Used to Access

Trang 13

Planning for ASP.NET Web Application Security

Authentication and Authorization

Choosing an authentication approach

Start Users don’t have Windows accounts

or certificates

Interactive Web app?

Use GXA Security Authentication

WS-Use Passport or Forms Authentication

No – Web Service

Yes

Trang 14

Planning for ASP.NET Web Application Security

Authentication and Authorization

Choosing an authentication approach

Trang 15

Planning for ASP.NET Web Application Security

Secure Communication Strategies

From client to Web server

application servers

Trang 16

Planning for ASP.NET Web Application Security

Threat Modeling

An iterative process

Trang 17

Planning for ASP.NET Web Application Security

Specific Threats

applications

Trang 18

Planning for ASP.NET Web Application Security

Specific Threats

Trang 19

Securing state information

Securing all tiers

Trang 20

Configuring Security

IIS to Secure Communication

Trang 21

Configuring Web

Application Security

Configure IIS Settings

Optionally install a Web server

certificate for SSL

Configure IIS authentication

Optionally configure client certificate

mapping

Set NTFS permissions on files and

folders

Trang 22

Demo 1

Configure IIS for SSL

Set Up the SecurityDemo Web Site

Create a Certificate Request Configure IIS for SSL and Certificates

Trang 23

Configuring Web

Application Security

ASP.NET Settings in Web.config

Trang 25

Securing state information

Securing all tiers

Trang 26

Put users in roles

Create an IPrincipal object

Put the IPrincipal object into current

HttpContext

Authorize based on user identity/role

Trang 27

Securing state information

Securing all tiers

Trang 28

Storing Secrets

Secret Examples

Credentials for SQL roles

Fixed identities in Web.config

Process identity in Machine.config

Keys used to store data securely

SQL Server session state

authentication against a database

Trang 29

Storing Secrets

Storage Methods and Tips

Install Web application directories on a

separate logical volume from the OS

Secret storage methods for ASP.NET apps

Data Protection API (DPAPI)

Trang 30

Demonstration 3

Create a Logon Page

and Validate Against

Authenticate a User

Trang 32

Securing state information

Securing all tiers

Trang 33

ASP.NET Process Identity

Guidelines

Configured in <processModel> element

Always run ASP.NET as a

least-privileged account

Using the default ASPNET account to

access remote resources

computers

Trang 34

Securing state information

Securing all tiers

Trang 35

Flowing Client Identity

Inherent performance issues

Trang 36

Flowing Client Identity

authorization with role-based checks

context

Trang 37

Securing state information

Securing all tiers

Trang 38

Accessing Resources

System Resources and COM Objects

Trang 39

Accessing Resources

Network Resources

ASP.NET process identity

Anonymous Internet user account

account through trust boundaries

Trang 40

Accessing Resources

Network Resources

Original caller using delegation

Trang 41

Securing state information

Securing all tiers

Trang 42

Securing State Information

(MAC) checks for pages that use view state

Trang 43

Securing State Information

Use IPSec or SSL to protect network

traffic between Web server and SQL

state database server

Trang 44

Securing state information

Securing all tiers

Trang 45

Web Farm Considerations

Security Implications

For DPAPI, consider user vs machine

store

For forms authentication, <machineKey>

must be the same for each computer

Trang 46

Securing state information

Securing all tiers

Trang 47

Securing All Tiers

From Code to Network

Trang 48

Session Summary

Planning for security is part of

designing a Web application

Threat modeling can help your team

focus resources on security

Creating a secure Web application is

demanding—Microsoft provides

resources to help you

Trang 49

For More Information…

Trang 50

For More Information…

Trang 51

Training and

Events

MSDN Webcasts, MSDN Online Seminars, Tech·Ed, PDC, Developer Days

Trang 52

How-to Resources

Simple, Step-by-Step Procedures

http://msdn.microsoft.com/howto

Trang 53

MSDN Webcasts

Interactive, Live Online Events

Interactive, synchronous, live online

events

Discuss the hottest topics from Microsoft

Open and free for the general public

http://www.microsoft.com/usa/webcasts

Trang 54

MSDN Subscriptions

The Way to Get Visual Studio NET

Professional

Tools to build applications

and XML Web services for Windows and the Web

Enterprise lifecycle tools

Team development support

Windows Server 2003 and

Trang 55

Where Can I Get MSDN?

Trang 56

Microsoft Press®

Essential Resources for Developers

Microsoft Visual Studio NET is here!

This is your chance to start building the next big thing Develop your NET skills, increase your productivity with NET books from Microsoft Press

www.microsoft.com/mspress

Trang 57

Become a Microsoft Certified Solution Developer

and develop custom business solutions

competency with Microsoft solution architecture, desktop applications, distributed application

development, and development tools

requirements, exams, and training options, visit www.microsoft.com/mcp

Trang 58

Get this Presentation

www.ManagedCode.com

Trang 59

© 2003 Microsoft Corporation All rights reserved.

This presentation is for informational purposes only Microsoft makes no warranties, express or implied, in this summary.

Microsoft, MSDN, Visual Basic, Windows, Windows NT, JScript, Visual Studio, Visual C#, Active Directory, Win32, and Microsoft Press are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries The names of actual companies and products mentioned herein may be the trademarks of

their respective owners.

Ngày đăng: 15/01/2014, 15:59

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w