To get the most out of this chapter, read the following chapters before or in conjunction with this chapter:
Read Chapter 2, "Threats and Countermeasures." This will give you a broader and deeper understanding of potential threats and countermeasures faced by Web applications.
Read Chapter 4, "Design Guidelines for Secure Web Applications." In this chapter, you will learn the architecture and design challenges and guidelines for building a secure solution.
Read Chapter 18, "Securing Your Database Server." Read Chapter 18 to understand how the database servers are secured.
Read Chapter 7, "Building Secure Assemblies." The guidelines and recommendations in Chapter 7 for building secure assemblies and for developing secure managed code should also be applied to data access code.
Use the Assessing Chapters . To review the security of your data access at different stages of the product cycle, refer to the Web services sections in the following chapters: Chapter 5, "Architecture and Design Review for Security," Chapter 21, "Code Review," and Chapter 22, "Deployment Review."
Use the Checklist . "Checklist: Securing Data Access" in the Checklists section of this guide includes a checklist for easy reference. Use this task-based checklist as a summary of the recommendations in this chapter.