Deployment and Infrastructure Considerations


Check

Description

The design identifies, understands, and accommodates the company security policy.

Restrictions imposed by infrastructure security (including available services, protocols, and firewall restrictions) are identified.

The design recognizes and accomodates restrictions imposed by hosting environments (including application isolation requirements).

The target environment code-access-security trust level is known.

The design identifies the deployment infrastructure requirements and the deployment configuration of the application.

Domain structures, remote application servers, and database servers are identified.

The design identifies clustering requirements.

The design identifies the application configuration maintenance points (such as what needs to be configured and what tools are available for an IDC admin).

Secure communication features provided by the platform and the application are known.

The design addresses Web farm considerations (including session state management, machine specific encryption keys, Secure Sockets Layer (SSL), certificate deployment issues, and roaming profiles).

The design identifies the certificate authority (CA) to be used by the site to support SSL.

The design addresses the required scalability and performance criteria.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net