SlideShare a Scribd company logo
SECURITY MECHANISMS
SUMMARY
Security Mechanisms to Achieve Goals
onfidentiality
ntegrity
vailability
Authentication
Authorization
Session Management
Data Validation
Error Handling
Logging
Encryption
Good practices cheat-sheet
Authentication
 Enforce basic password security
 Implement an account lockout for failed logins
 “Forgot my password” functionality can be a problem
 For web applications, use and enforce POST method
Authorization
 Every function (page) must verify authorization to access
 Every function (page) must verify the access context
 Any client/server app must verify security on the server
Error Handling
 Don’t disclose information that should remain private
 Remember to cleanup completely in an error condition
Encryption
 If storing passwords – hash with a salt value
 If you’re using authentication – encrypt in transmission
 Properly seed random number generators
Data Validation
 Validate data before use in SQL Commands
 Validate data before sending back to the client
 Validate data before use in ‘eval’ or system commands
 Validate all data lengths before writing to buffers
Session Management
 Enforce a reasonable session lifespan
 Leverage existing session management solutions
 Force a change of session ID after a successful login
Logging
 Avoid logging sensitive data (e.g., passwords)
 Beware of logging tainted data to the logs
 Beware of logging excessive data
 Beware of potential log spoofing

More Related Content

PPTX
Database security
PPTX
Decrypting the security mystery with SIEM (Part 2) ​
PPTX
Overview of RateSetter web security
PDF
Payment Card Industry Data Security Standard (PCI DSS) 3.0
PPT
Database Systems Security
PPT
Database Security
PDF
Web application security (eng)
PPT
Updated Mvc Web security updated presentation
Database security
Decrypting the security mystery with SIEM (Part 2) ​
Overview of RateSetter web security
Payment Card Industry Data Security Standard (PCI DSS) 3.0
Database Systems Security
Database Security
Web application security (eng)
Updated Mvc Web security updated presentation

Similar to 11 application security fundamentals - part 2 - security mechanisms - summary (20)

PPTX
Uwvwwbwbwbwbwbwbwbnit-4 - web security.pptx
PPT
Web security presentation
PPTX
Lecture-8. I know this slide is littlepptx
PPTX
Lecture- program are executed in syst9.pptx
PPTX
Core defense mechanisms against security attacks on web applications
PDF
Session4-Authentication
PDF
[Austria] Security by Design
PPTX
Mobile Application Security - Broken Authentication & Management
PPT
Secure code practices
PPT
Web security leeds sharp dot netnotts
PPSX
Broken Authentication & authorization
PPT
Web application development_dos_and_donts
PPTX
Secure Software Engineering
PPTX
Authentication and session v4
PPTX
2 security concepts
PDF
CNIT 129S: Securing Web Applications Ch 1-2
PDF
Best Security Practices for Web Application Development.pdf
PPT
Survey Presentation About Application Security
PDF
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
PDF
OWASPTop 10
Uwvwwbwbwbwbwbwbwbnit-4 - web security.pptx
Web security presentation
Lecture-8. I know this slide is littlepptx
Lecture- program are executed in syst9.pptx
Core defense mechanisms against security attacks on web applications
Session4-Authentication
[Austria] Security by Design
Mobile Application Security - Broken Authentication & Management
Secure code practices
Web security leeds sharp dot netnotts
Broken Authentication & authorization
Web application development_dos_and_donts
Secure Software Engineering
Authentication and session v4
2 security concepts
CNIT 129S: Securing Web Applications Ch 1-2
Best Security Practices for Web Application Development.pdf
Survey Presentation About Application Security
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
OWASPTop 10
Ad

More from appsec (12)

PPTX
23 owasp top 10 - resources
PPTX
15 owasp top 10 - a3-xss
PPTX
12 owasp top 10 - introduction
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
04 application security fundamentals - part 2 - security mechanisms - authe...
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PPTX
02 application security fundamentals - part 1 - security priciples
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
23 owasp top 10 - resources
15 owasp top 10 - a3-xss
12 owasp top 10 - introduction
10 application security fundamentals - part 2 - security mechanisms - encry...
09 application security fundamentals - part 2 - security mechanisms - logging
08 application security fundamentals - part 2 - security mechanisms - error...
06 application security fundamentals - part 2 - security mechanisms - sessi...
07 application security fundamentals - part 2 - security mechanisms - data ...
04 application security fundamentals - part 2 - security mechanisms - authe...
05 application security fundamentals - part 2 - security mechanisms - autho...
02 application security fundamentals - part 1 - security priciples
01 Application Security Fundamentals - part 1 - introduction and goals
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

11 application security fundamentals - part 2 - security mechanisms - summary

  • 2. Security Mechanisms to Achieve Goals onfidentiality ntegrity vailability Authentication Authorization Session Management Data Validation Error Handling Logging Encryption
  • 3. Good practices cheat-sheet Authentication  Enforce basic password security  Implement an account lockout for failed logins  “Forgot my password” functionality can be a problem  For web applications, use and enforce POST method Authorization  Every function (page) must verify authorization to access  Every function (page) must verify the access context  Any client/server app must verify security on the server Error Handling  Don’t disclose information that should remain private  Remember to cleanup completely in an error condition Encryption  If storing passwords – hash with a salt value  If you’re using authentication – encrypt in transmission  Properly seed random number generators Data Validation  Validate data before use in SQL Commands  Validate data before sending back to the client  Validate data before use in ‘eval’ or system commands  Validate all data lengths before writing to buffers Session Management  Enforce a reasonable session lifespan  Leverage existing session management solutions  Force a change of session ID after a successful login Logging  Avoid logging sensitive data (e.g., passwords)  Beware of logging tainted data to the logs  Beware of logging excessive data  Beware of potential log spoofing