Configuration Management


If your application provides an administration interface that allows it to be configured, examine how the administration interfaces are secured. Also examine how sensitive configuration data is secured. Table 5.4 shows the most common configuration management vulnerabilities.

Table 5.4: Common Configuration Management Vulnerabilities

Vulnerability

Implications

Insecure administration interfaces

Unauthorized users can reconfigure your application and access sensitive data.

Insecure configuration stores

Unauthorized users can access configuration stores and obtain secrets, such as account names and passwords, and database connection details.

Clear text configuration data

Anyone that can log in to the server can view sensitive configuration data.

Too many administrators

This makes it difficult to audit and vet administrators.

Over-privileged process accounts and service accounts

This can allow privilege escalation attacks.

Use the following questions to help validate the approach of your application design to configuration management:

  • Do you support remote administration?

  • Do you secure configuration stores?

  • Do you separate administrator privileges?

Do You Support Remote Administration?

If your design specifies remote administration, then you must secure the administration interfaces and configuration stores because of the sensitive nature of the operations and the data that is accessible over the administration interface. Review the following aspects of your remote administration design:

  • Do you use strong authentication?

    All administration interface users should be required to authenticate. Use strong authentication, such as Windows or client-certificate authentication.

  • Do you encrypt the network traffic?

    Use encrypted communication channels, such as those provided by IPSec or virtual private network (VPN) connections. Do not support remote administration over insecure channels. IPSec allows you to limit the identity and number of client machines that can be used to administer the server.

Do You Secure Configuration Stores?

Identify the configuration stores of your application and then examine your approach to restricting access to the stores and securing the data inside the stores.

  • Is your configuration store in the Web space?

    Configuration data that is held in files in the Web space is considered less secure than data that is held outside the Web space. Host configuration mistakes or undiscovered bugs could potentially allow an attacker to retrieve and download configuration files over HTTP.

  • Is the data in the configuration store secure?

    Make sure that key items of configuration data, such as database connection strings, encryption keys, and service account credentials, are encrypted inside the store.

  • How is access to the configuration store restricted?

    Check that the administration interface provides the necessary authorization to ensure that only authenticated administrators can access and manipulate the data.

Do You Separate Administrator Privileges?

If your administration interfaces support different functionalities ” for example, site content updates, service account reconfiguration, and database connection details ” verify that your administration interfaces support role-based authorization to differentiate between content developers and operators or system administrators. For example, the person who updates static Web site content should not necessarily be allowed to alter the credit limit of a customer or reconfigure a database connection string.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net