I am going to filter this point according to priority basic.
a) Design Issue
- Proper validation for numeric, alphanumeric, date time, maximum length and other search filed.
- Absolute URLs must be used.
- Our all input parameter will be validated.
- Query strings with server secrets are hashed.
- Required filed required, if field are necessary in database. There must be a proper treatment of null values.
- Web control user control
- Documentation of session and view state is necessary for using in near future.
- SQL parameters are used in data access code to validate length and type of data and to help prevent SQL injection.
- Passwords are not being stored in the session directly
- Strong password policies are implemented for authentication.
- Connection strings are encrypted by using Aspnet_setreg.exe.
- Proper error handling is necessary.
- Proper try catch block necessary, not necessary to every where.
- View state is protected using message authentication codes (MACs).
- We will not store our sensitive data in cookies, hidden form fields, or query strings.
- Session and view state object must be use in proper format, NULL value checking is necessary
- Compilation debug=false at sever side.
- We need to set a default, page in the IIS.
- For IIS Web permissions are configured. Bin directory does not have Read, Write, or Directory browsing permissions. Execute permissions are set to none. Authentication settings are removed (so that all access is denied).
- Proper read write permission required according to the users.
- Error handling page required, Generic error pages with harmless messages are returned to the client.
comments
0 Responses to "ASP.NET Basic Security"Post a Comment