Mostly the security requirements remain undocumented and is left to the choice or experience of the architects and developers thus leaving vulnerabilities in the application, which hackers exploit to launch an attack on the enterprise's digital assets. Security threats are on the rise and is now being considered as a Board Item as the impact of security breach is very high and could cause monetary and non monetary losses.
One of the key aspects of the IT Governance is to ensure that the investments made in software assets are optimal and there is a quantifiable return on such investments. This also means that such investment does not lead to risks that could lead to damages. Most of us are well aware that reviews play a key role in ensuring the quality of the software assets. As such, in this blog post, I have tried to come up with a checklist for reviewing the architecture and design of a software application.
While the choice of specific design best practice is interdependent on another, a careful tradeoff is necessary. For a detailed discussion on Trade off Analysis of Software Quality Attributes. Each of the checklist item listed here needs further elaboration and identification of specific practices, which will depend on the enterprise architecture and design principles of the organization.
Deployment Considerations
Application Architecture Considerations
Input Validation
One of the key aspects of the IT Governance is to ensure that the investments made in software assets are optimal and there is a quantifiable return on such investments. This also means that such investment does not lead to risks that could lead to damages. Most of us are well aware that reviews play a key role in ensuring the quality of the software assets. As such, in this blog post, I have tried to come up with a checklist for reviewing the architecture and design of a software application.
While the choice of specific design best practice is interdependent on another, a careful tradeoff is necessary. For a detailed discussion on Trade off Analysis of Software Quality Attributes. Each of the checklist item listed here needs further elaboration and identification of specific practices, which will depend on the enterprise architecture and design principles of the organization.
Deployment Considerations
- The design references the security policy of the organization and is in compliance of the same.
- The application components are designed to comply with the various networking and other infrastructure related security restrictions like firewall rules, using appropriate secure protocols, etc.
- The trust level with which the application accesses various resources are known and are in line with the acceptable practices.
- The design supports the scalability requirements such as clustering, web farms, shared session management.
- The design identifies the configuration / maintenance points, and the access to the same is manageable.
- Communication with various local or remote components of the application is using secure protocols.
- The design addresses performance requirements by adhering to relevant design best practices.
Application Architecture Considerations
Input Validation
- Whether the design identifies all entry points and trust boundaries of the application.
- Appropriate validations are in place for all inputs that comes from ourside the trust boundary.
- The input validation strategy that the application adopted is modular and consistent.
- The validation approach is to constrain, reject, and then sanitize input.
- The design addresses potential canonicalization issues.
- The design addresses SQL Injection, Cross Site Scripting and other vunerabilities
- The design applies defense in depth to the input validation strategy by providing input validation across tiers.
- The design identifies the identities or roles that are used to access resources across the trust boundaries.
- Service account or such other predefined identity requirements to, if so needed to access variuos system resources are identified and documented.
- User credentials or authentication tokens are stored in secure manner and access to the same is appropriately controlled and managed.
- Where the credentials are shared over the network, appropriate security protocol and encryption techniques are used.
- Appropriate account management policies are considered.
- In case of authentication failures, the error information displayed is minimal so that it does not reveal any clues that could make the credential guessing easier.
- The design adopts a policy of using least-privileged accounts.
- Password digests with salt are stored in the user store for verification.
- Password rules are defined so that the stronger passwords are enforced.
- The user role design offers sufficient separation of privileges and considers authorization
- granularity.
- Multiple gatekeepers are envisaged for defense in depth.
- The application’s identity is restricted in the database to access-specific stored procedures and does not have permissions to access tables directly.
- Access to system level resources are restricted unless there is an absolute necessity.
- Code Access Security requirements are established and considered.
- Stronger authentication and authorization is considered for access to administrration modules.
- Secure protocols are used for remote administration of the application.
- Configuration data is stored in a secured store and access to the same is appropriately controlled and managed
- Least-privileged process accounts and service accounts are used.
- Design recognizes sensitive data and considers appropriate checks and controls on the same.
- Database connections, passwords, keys, or other secrets are not stored in plain text.
- The design identifies the methodology to store sensitive data securely. Appropriate algorithms and
- key sizes are used for encryption.
- Error logs, audit logs or such other application logs does not store sensitive data in plain text.
- The design identifies protection mechanisms for sensitive data that is sent over the network.
- The contents of authentication cookies are encrypted.
- Session lifetime is limited and times out upon expiration.
- Session state is protected from unauthorized access.
- Session identifiers are not passed in query strings.
- Platform-level cryptography is used and it has no custom implementations.
- The design identifies the correct cryptographic algorithm and key size for the application’s data encryption requirements.
- The methodology to secure the encryption keys is identified and the same is in line with the acceptable best practices.
- The design identifies and establishes the key recycle policy for the application.
- All input parameters are validated including form fields, query strings, cookies, and HTTP headers.
- Sensitive data is not passed in query strings or form fields.
- HTTP header information is not relied on to make security decisions.
- View state is protected using MACs.
- The design outlines a standardized approach to structured exception handling across the application.
- Application exception handling minimizes the information disclosure in case of an exception.
- Application errors are logged to the error log, and the design provides for periodic review of such logs.
- Sensitive data is not logged as part of the error logs, but where necessary, the same is logged with appropriate de-identification technique
- The design identifies the level of auditing and logging necessary for the application and identifies the key parameters to be logged and audited.
- The design considers how to flow caller identity across multiple tiers at the operating system or application level for auditing.
- The design identifies the storage, security, and analysis of the application log files