Chapter 17– Attacking Application Architecture Hareesh Lingareddy
Tiered Architectures Attacking Tiered Securing Tiered Cloud Attacking Cloud Securing Cloud
Multitier architecture common 3-tier architecture Advantages Reuse Parallel work
Exploiting Trust Relationships Application tier Programming errors Subverting Other Tiers Using file read access to extract MySQL data Limited Compromise
Minimize Trust Relationships Role-based access controls Usage of various accounts Segregate Different Components Limited access to files Filtered network level access All Defense in Depth Encrypting sensitive data
Possible sections of attack Governance Data Architecture Applications Assurance Token based access Web storage
Secure Customer Access Robust authentication Privilege based access Segregate Customer Functionality