HOW TO MAKE YOUR ORACLE APEX APPLICATION SECURE Peter Lorenzen, WM-data a LogicaCMG company
|
|
|
- Alban Jefferson
- 9 years ago
- Views:
Transcription
1 HOW TO MAKE YOUR ORACLE APEX APPLICATION SECURE Peter, WM-data a LogicaCMG company Security - What security? The lesson learned in the Internet era is that nothing is secure. There are security flaws in all systems. Therefore security is something that has to be taken seriously. The subject is enormous so this article will be more of an overview of the threats and countermeasures than a thorough analysis. It will be in terms of what I believe an Oracle Application Express (APEX) developer in a small shop, without a fulltime security expert or DBA, should know. We will look at architecture, hardening of the components in the architecture and then proceed to specific threats. The amount of time and money that is used on security should always be measured against the value of the data that is secured. The basis for this presentation is that we have an application that contains valuable and secret information, and that the application is accessed from the Internet. "Security is an architecture, not an appliance - Art Wittman APEX consists of a database and a HTTP Web server. The HTTP server can be one of these flavors: An Oracle XML DB HTTP Server An Oracle HTTP Server from the database companion CD An Oracle HTTP Server from the Oracle Application Server 10g The Oracle XML DB HTTP Server This HTTP server is running in the database. It was introduced with Oracle XML DB in Oracle 9i R2 and uses the Embedded PL/SQL Gateway (EPG) to talk to the database. The special version of APEX used in the free Oracle database - Oracle 1 ODTUG Kaleidoscope 2007
2 Express Edition, uses this HTTP server. Currently it is not supported for any other database versions, but it will be supported for release 11 of the database. The Oracle HTTP Server (OHS) from the database companion CD This OHS is based on an Apache 1.3.x HTTP server and uses the mod_plsql module to communicate with the database. Apache 1.3 is an old but stable version that will not be enhanced anymore, except with security patches. The Oracle HTTP Server (OHS) from the Oracle Application Server 10g This OHS is based on an Apache 1.3.x HTTP server and as far as I know it is identical to the OHS from the database companion CD. Which HTTP Server to Use? When version 11 of the database is released we will have 2 HTTP servers to choose from. From a security perspective, I would choose an OHS. The reason being it is a popular Web server of proven quality, while the XML DB HTTP server is an unproven creature. On the Oracle Application Server companion CD is an OHS based on an Apache 2.0.x HTTP server. This release does not contain the mod_plsql module and can therefore not be used for APEX. Choosing an Architecture You should choose an architecture where as little as possible is exposed to the Internet. The minimum setup I would suggest is shown in figure 1. Figure 1. Minimum architecture APEX is tucked away on the Intranet. The Apache HTTP server in the DMZ can be an OHS, but you have to pay a license fee to Oracle if you use it. You are not allowed to install an OHS on any server other than one that contains the Oracle Database or the Oracle Application Server, unless you pay for an extra license. A free alternative is to use a standard Apache 1.3/2.0 HTTP server directly from Apache. Do note that administering a standard Apache differs from an OHS, so if you want a familiar interface you need an OHS. For added security many choose to encrypt the communication between the browser and the HTTP Web server. If encryption is not used an eavesdropper can intercept all information sent between the browser and the server, even passwords. The most popular way to encrypt is via Secure Sockets Layer (SSL). The encryption is transparent to APEX and therefore no configuration is needed in APEX. This architecture is shown in figure ODTUG Kaleidoscope 2007
3 Figure 2. Using SSL encryption For added security it is also possible to use SSL encryption between the Apache HTTP server in the DMZ and the HTTP server installed with APEX. Since SSL is a de facto standard for securing Internet communication I will later explain a bit above how to set it up. Hardening your Architecture It is important to harden the different components in your architecture. This means patching all components and removing unnecessary functionality, users, privileges, etc. Patch, Patch, Patch One of the most important security measures is patching. Always keep your software updated with the latest patch. This includes the Operating system. Oracle releases a quarterly Critical Patch Update (CPU) that contains security patches for all implicated Oracle products. You can subscribe to Oracle Security Alerts at the Oracle Technology Network (OTN) site. Also remember to install the normal patch sets as they are released. You can get patch sets from Oracle Metalink, but only if you have an active support agreement. I know of no way to get notified when normal patch sets become available, so visit Metalink on a regular basis. The Oracle XML DB HTTP is patched via the database patches. The OHS servers should be patched with patches from Oracle not from Apache. Apache servers installed directly from Apache should be patched via Apache does not as such release patches, but releases a whole new version when it is needed. Hardening the Database Do not use the free Express Edition (XE) database since it can not be patched. Follow the principle of least privilege, so a user only has access to the resources required. Lock or remove unused users. Use sensible passwords, and do not use the same password for SYS and SYSTEM. There are lots of more advanced things you can do so check these: Oracle has a thorough up-to-date Database Security Checklist. See Oracle has created Project Lockdown which is a project that via 4 phases helps you to secure your database infrastructure. See Hacking and Securing Oracle - A Guide To Oracle Security by Pete Finnigan. This is scary stuff so don t read it late at night. Hardening the Apache HTTP Web Server Apache comes with a lot of pre-loaded modules that you probably won t need. For example mod_perl and mod_cgi. Remove these by deleting the corresponding LoadModule directives from the httpd.conf file. There are also pre-installed content and examples that should be removed, things like FastCGI examples. It is an advantage to give away as little information as possible about the software you run. If you call a page that does not exist, Apache will return a HTTP 404 error with information like this: Oracle-Application-Server-10g/ Oracle-HTTP-Server Server at apex.corp.net Port ODTUG Kaleidoscope 2007
4 As default this is shown in the http header: Server: Oracle-Application-Server-10g/ Oracle-HTTP-Server. To stop the publishing of this information these two directives in the httpd.conf file can be changed: ServerSignature Off ServerTokens Prod For a comprehensive checklist of things to harden read these: Securing Oracle Application Server by Caleb Sima. See Hardening Oracle Application Server 9i and 10g by Alexander Kornbrust. See They both cover the Oracle Application Sever so they contain information that is not relevant if you use the OHS from the database Companion CD but they are still very informative. Specific Threats In this section, I will take a closer look at some of the major threats and what can be done to counter them. Cross-Site Scripting (XSS) XSS is a misleading label, but for historic reasons this is what it is called. It covers different types of attacks. My simple definition is that it covers situations where an attacker injects JavaScript in an application in order to steal data or corrupt the application. Here is a simple example in APEX: 1. Create or pick an existing table that contains a Varchar2 column 2. Create a Form on the table of type Form on a Table with Report 3. Run the Report and create a row with this data: Test<script>alert( Hello world );</script> 4. When you press Create and branch back to the Report the JavaScript is executed and you should see an alert message like the one in Figure 3. Figure 3. XSS example Following the example a user can write a malicious JavaScript that is executed when another user displays the Report page. The attacker can steal all the data in the browser including cookies and credentials. To prevent this, change Display as from "Standard Report Column" to "Display as text (escape special characters, does not save state)" in the Column Definition under the Report Attributes. Now the JavaScript is not executed. The reason is that special characters like <,>,&," are now escaped. If you look on the page source it looks like this: Test<script>alert('Hello world');</script> Escaping is the weapon of choice when dealing with XSS threats. If you write your modules in PL/SQL you can use the htf.escape_sc function to escape special characters. 4 ODTUG Kaleidoscope 2007
5 SQL Injection An SQL Injection attack is a form of attack where the attacker inputs extra SQL in an application. Here is a simple but illustrative example. If you have an APEX Report based on a SQL Query, like this Select: select ename, job, sal from emp where ename = '&P1_ENAME.' P1_ENAME is a text item that the user can input. If the user inputs a valid name like KING one row is displayed, but if the user instead input this: QWERTY' or 1=1-- All rows will be displayed, which might not be the intention. You can change the Select to use bind variables like this: return 'select ename, job, sal from emp where ename = :P1_ENAME'; Now there won t be any problem. The reason is that the Oracle database uses the value of the bind variable exclusively and does not interpret its contents in any way. You should of cause always use bind variables since it is well known that it improves performance by allowing statement reuse and thereby prevents hard parses. Generally SQL Injection should not be too much of a problem in APEX, but take care when using end-user input in your DML. In PL/SQL you can write dynamic SQL via the old DBMS_SQL package or the modern Native Dynamic SQL (NDS) e.g. Execute Immediate. If you use these you should be aware and always validate the input. Check for length, parentheses, comments (--, /* */) etc. or do a sanity check by validating the input against a table. If the user inputs a department name check that the department name exists. Hardening APEX APEX has a string of built in functions that can help make you application more secure. Session State Protection (SSP) In an APEX application it is by default possible to change parameters in the URL hereby gaining access to information you should not be able to access. This URL tampering can be prevented by using SSP. When SSP is enabled and configured for a page, a checksum is calculated from the URL parameters and set as a new parameter. When a page is called the checksum is recalculated and checked against the parameter value. If the checksum does not match, the page is not displayed and you receive an error message. SSL is a very good security measure and should be used in most applications. When a checksum is calculated a random salt is used. You can change the salt via the clicking Expire Bookmarks on the Edit Security Attributes page. Even though SSP helps to prevent URL tampering, there really should be other security measures on the pages or even better in the database to prevent unauthorized access. On the page you can prevent access to the whole page or objects on the page using authorization schemes. In the database you can for example use triggers, or Virtual Private Database (VPD) to prevent access. Security Options in the Administration Services In the APEX Administration Services, an administrator has a list of security options that should be configured on a production server before going live. Disable Administrator Login: This prevents any user from logging in to the Administration Services. This setting can be reversed by calling a couple of PL/SQL procedures. (See more in the User s Guide) Disable Workspace Login: Prevents any user from logging in to any workspace. When you need to install a new version of your application you have to undo the Disable Administrator Login as explained above and then undo Disable Workspace Login. Restrict Access by IP Address: Instead of using the 2 options above you can input a list of IP addresses from which it is OK to login as an administrator or into a workspace. Workspace Password Policy: It is possible to set a range of options for the password policy for Application Express users (workspace administrators, developers, and end users) in all workspaces. Things like checks for min./max. length and number of alphabetic and numeric characters. It is also possible to define a list of words that a password may not contain. 5 ODTUG Kaleidoscope 2007
6 There are other options so be sure to check them out. Miscellaneous For the application running in production debugging should be disabled and Build Status should be Run Application Only. This can either be set manually in the Application definition or when you export the application for import on the production server. When you export also remember to set Export Comments to No. There is no reason to expose that kind of information. When you use HTML controls like checkboxes, radio buttons or select lists you might think that you don t need to validate the input from these since the values are constrained. You cannot however count on this. A select list can easily be converted to a normal text input field. For example if you use the Mozilla Firefox browser with the Web Developer Extension installed, you have a menu option that can convert all select lists on the current page to text fields. So take care and validate all input. Use a database trigger or if possible a foreign key constraint or a check constraint. Obfuscate the APEX_PUBLIC_USER Password This function is not really a part of APEX but still interesting. When a user is logged into an APEX application all database operations are performed by a database session connected as APEX_PUBLIC_USER as defined in the DAD setup file (dads.conf). This is true for all authentication schemes. The APEX_PUBLIC_USER user only have the CREATE SESSION privilege. As default the password for APEX_PUBLIC_USER is stored in clear text in the PlsqlDatabasePassword parameter in the DAD. For added security the password can be obfuscated via the dadtool.pl utility. See: ORACLE_HOME\Apache\modplsql\conf\dadTool.README Here is an example of using the dadtool on Windows: set ORACLE_HOME=D:\OracleDb10g set PATH=%ORACLE_HOME%\Apache\modplsql\conf;%PATH% set PATH=%ORACLE_HOME%\perl\5.6.1\bin\MSWin32-x86;%PATH% set PATH=%ORACLE_HOME%\bin;%PATH% cd %ORACLE_HOME%\Apache\modplsql\conf perl dadtool.pl -o If you use marvel.conf you need to temporarily rename the file to dads.conf. Implementing SSL in a Oracle HTTP Server There are several cryptographic techniques involved in SSL: Public-Private Key, Symmetric Key, and Digital Signature. For simplicity I will ignore most of this. The first time a browser sends a request for a page that is secured by SSL. The HTTP server responds by sending a certificate back to the browser. The browser checks if this certificate has been signed by a trusted authority listed in the browser. If it has an SSL connection is started. The trusted authorities are called a Certificate Authority (CA). An example of a CA is Verisign. You can use your own self signed certificates but it complicates matters. Oracle uses a Wallet to store the keys, certificates etc. that is used for SSL on the OHS. A Wallet is just a directory on the server where the information is store encrypted. Oracle Wallet Manager is used to manage the Wallets. The first thing you need to do is to generate a Certificate Signing Request (CSR) in the Wallet Manager and send it to the CA. The CSR contains, among other things, information about the person/organization that is requesting the certificate signing. The CA receives the CSR, signs it and returns it. Then the CSR has to be imported into to the Wallet via the Wallet Manager. Now you are ready to use SSL. I have created a more thorough How-to on the APEX Wiki, see Conclusion This paper outlines a couple of ways to design your security architecture and lists a string of issues that I hope can inspire you to create your own checklist for hardening your architecture. Most of the things I have listed are some that can easily be implemented without big costs. Basic security hardening does not need to be expensive it is just at matter of knowing where the weaknesses are. Please read the database and Oracle Application Server documents that is mentioned. Especially Pete Finnigan s paper is an eye-opener and a must-read. If you deploy on the Internet security cannot be ignored, but do not forget the threats inside the firewalls. Resent studies show that the vast majority of computer hacking is done by current and former employees. 6 ODTUG Kaleidoscope 2007
How to Make Your Oracle APEX Application Secure
How to Make Your Oracle APEX Application Secure Peter Lorenzen Technology Manager WM-data Denmark a LogicaCMG Company [email protected] LogicaCMG 2006. All rights reserved 1 Presentation Target audience
Expert Oracle Application. Express Security. Scott Spendolini. Apress"
Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
<Insert Picture Here> Michael Hichwa VP Database Development Tools [email protected] Stuttgart September 18, 2007 Hamburg September 20, 2007
Michael Hichwa VP Database Development Tools [email protected] Stuttgart September 18, 2007 Hamburg September 20, 2007 Oracle Application Express Introduction Architecture
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
REDCap General Security Overview
REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
J j enterpririse. Oracle Application Express 3. Develop Native Oracle database-centric web applications quickly and easily with Oracle APEX
Oracle Application Express 3 The Essentials and More Develop Native Oracle database-centric web applications quickly and easily with Oracle APEX Arie Geller Matthew Lyon J j enterpririse PUBLISHING BIRMINGHAM
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
10gAS SSL / Certificate Based Authentication Configuration
I. Overview This document covers the processes required to create a self-signed certificate or to import a 3 rd party certificate using the Oracle Certificate Authority. In addition, the steps to configure
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Web Application Firewall on SonicWALL SRA
Web Application Firewall on SonicWALL SRA Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SRA 6.0. This document contains the following
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Sage Accpac CRM 5.8. Self Service Guide
Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
REDCap Technical Overview
REDCap Technical Overview Introduction REDCap is a web application for building and managing online surveys and databases. This document delineates many of the broader technical aspects of REDCap, such
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
An Oracle White Paper June 2014. RESTful Web Services for the Oracle Database Cloud - Multitenant Edition
An Oracle White Paper June 2014 RESTful Web Services for the Oracle Database Cloud - Multitenant Edition 1 Table of Contents Introduction to RESTful Web Services... 3 Architecture of Oracle Database Cloud
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
ADMINISTRATOR GUIDE VERSION
ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
Generating a Certificate Signing Request (CSR) from LoadMaster
SSL Guide From MyKemp Wiki The world of Secure Sockets Layer (SSL) certificates can be a bit confusing, so this document was assembled to help guide users of LoadMasters through the various processes involving
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
7.0 Self Service Guide
7.0 Self Service Guide Copyright 2010 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)
USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Web application security: Testing for vulnerabilities
Web application security: Testing for vulnerabilities Using open source tools to test your site Jeff Orloff Technology Coordinator/Consultant Sequoia Media Services Inc. Skill Level: Intermediate Date:
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Active Directory Integration. Documentation. http://mid.as/ldap v1.02. making your facilities work for you!
Documentation http://mid.as/ldap v1.02 making your facilities work for you! Table of Contents Table of Contents... 1 Overview... 2 Pre-Requisites... 2 MIDAS... 2 Server... 2 AD Users... 3 End Users...
Implementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
E-Commerce for IT Advanced. Louis Aguila & Matt Burt
Advanced Louis Aguila & Matt Burt Class Objectives To explore Microsoft Internet Information Services (IIS) use and troubleshooting Basic E-Commerce site setup in IIS Use of Application Pools and settings
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Deploying the BIG-IP System v10 with Oracle Application Server 10g R2
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
