Essential Tips To Secure Web Applications - Indusface Blog
Essential Tips To Secure Web Applications - Indusface Blog
From 200 million in the year 2000 to 3.5 billion users in 2019, the staggerin
testimony of the internet’s all-pervasive nature. It has transformed itself from
necessity indispensable for any entity.
As the world and its economy is fully internet-dependent now, it is fully expo
threats of online attacks from malicious hackers, syndicate gangs, spy agen
hostile governments. Earlier, most of the online attacks ended up defacing
thefts, and DoS. More recently, cyber-attacks are more of ransomware
nature. Ransomware attacks hijack operations for an exorbitant cost.
3. Secure coding practices. This includes automated code analysis and vulne
scanners.
4. Thorough security testing at multiple levels. A few testing strategies:
Input testing.
White box testing. Employing source code analyzers.
Black box testing using security scanners for vulnerabilities and pene
Brute force attacks testing.
DoS attacks testing.
5. Compartmentalized and isolated deployment.
6. Web Application firewalls. (WAF).
Contents [hide]
All inputs, including form fields, cookies, query strings, HTTP headers, sho
strong validations and trust factor authentication.
Centralised input validation should be the preferred method to validate inp
Client-side validations should be completely avoided.
Validate for type, length, format, and range
Validate, Filter, scrub, constrain, reject and sanitise the input data.
https://www.indusface.com/blog/tips-to-protect-web-applications/ 2/5
5/5/2020 Essential Tips to Secure Web Applications | Indusface Blog
Authentication
If a web application is a vault, authentication is its lock and key. Only autho
have the key to the lock can only enter the vault. Managing authentication u
passwords, 2-way authentication, and/or digital tokens should be securely i
Many applications allow the transit of passwords in plaintext. This is a recip
Many applications allow SSOs for organization-wide integration. Ensure the
policy of ADS, LDAP, or any other directory services have a strong authenti
mechanism.
Authorization
Authentication and authorization always go hand-in-hand. While authentica
who can log in to the application, authorization is about what one can do aft
Can a user start or stop a service? Can a user rename, delete, suspend or
passwords of other users and many other levels of permissions? Can a use
database directly? Can a user access an API.
Data protection
https://www.indusface.com/blog/tips-to-protect-web-applications/ 3/5
5/5/2020 Essential Tips to Secure Web Applications | Indusface Blog
Failure handling
Usually, when attacks happen, especially the DOS type of attacks, services
stop functioning as expected. In case of a function failure, exception handlin
ensure graceful failures and swift garbage cleaning to prevent leakages.
https://www.indusface.com/blog/tips-to-protect-web-applications/ 4/5
5/5/2020 Essential Tips to Secure Web Applications | Indusface Blog
Server security
Having looked at the design of web applications, let us also look at another
aspect of web applications security – Servers on which the web application
Servers are important as they house the web applications. If not configured
are the first defence which falls apart, leaving the application exposed to th
Guidelines to secure application servers are as below:
Testing
Even though one may secure the applications and servers at a point in time
software stack is updated, new vulnerabilities still creep in. That’s why frequ
depth testing is important. Here’s a guideline from OWASP (https://owasp.o
web-security-testing-
guide/assets/archive/OWASP_Web_Application_Penetration_Checklist_v1_
https://www.indusface.com/blog/tips-to-protect-web-applications/ 5/5