Download presentation
Presentation is loading. Please wait.
1
Securing Your Web Application and Database
June 9 – 10, 2016 Presenters: Garth Colasurdo, Nader Khalil, Tuan Bui
2
What we will cover today:
Why App/Database Security? How-to: Development of (Secured) App/Database Planning and Architecture Mobile and Web-based App Security Points How IT Can Help You…
3
Why App/Database Security?
4
Because… There are bad people out there that want to exploit your work for personal gains. Since November UNM: 559+ web vulnerabilities (potential exploits exist) 12+ compromised websites (forcibly taken over) 2 personal data incidents (FERPA)
5
Because… There are bad people out there that want to exploit your work for personal gains. Since November UNM: 559+ web vulnerabilities (potential exploits exist) 12+ compromised websites (forcibly taken over) 2 personal data incidents (FERPA)
6
How-to: Planning and Architecture
7
Planning and Architecture
Addressing Business Needs New Vs. Existing Vendor Vs. In-house Cloud Vs. On-premise Business Needs Technical Needs User Needs
8
Planning and Architecture
Technology Choices Type of application Type of developing tools Type of hosting Type of data to be collected
9
Planning and Architecture
Key Data Sensitivity Type of data you may collect “directory information” Do not collect information you do not need Sharing information with other Data Classification E Class(encrypted): SSN(or part of it), Tax Information, student medical record C Class(Confidential): GPA, Race, Gender P Class(Public): Name, Address, Telephone listing
10
Planning and Architecture
Roles and Responsibilities Data Owners Senior administrators --> ultimate authority and responsibility for the access, accuracy, classification, and security of the data within their delegations of authority. Data Stewards University officials who have direct operational-level authority and responsibility for the management of one or more types of institutional data Data Custodian Responsible for the operation and management of technology, systems, and servers that collect, store, process, manage, and provide access to University data Data User Authorized individuals -->to perform assigned duties or functions within the University.
11
Planning and Architecture
Policies Acceptable Computer Use, UNM Policy 2500 Computer Security Controls and Access to Sensitive and Protected Information, Credit Card Processing, UNM Policy 7215 Information Security, UNM Policy 2550 Social Security Numbers, UNM Policy 2030 Health Insurance Portability and Accountability Act (HIPPA) Federal Law The Family Educational Rights and Privacy Act (FERPA) Standards Data Classification Data Encryption Information Stewardship and Confidentiality
12
Planning and Architecture
Business Needs Find a solution Security Assessment Design Implement Full Lifecycle Planning Business Needs Find a Solution Security Assessment Design Implement Support
13
How-to: Mobile or Web-based App Security Points
<? php secure_database.always ?> <protect.forms.no_injection.all> xScriptHijack(this.page) { xsite: false; }
14
Start Here: www.owasp.org
15
Restricting Access Roles Can you use CAS?
Customer roles Office roles Can you use CAS? Be very careful about local accounts Not a business you want to be in
16
Server Configurations
Communication layer: SSL all the time Source file access File uploads from users Error messages
17
Credentials Isolation Transactions Encryption
Protecting Data Credentials Isolation Transactions Encryption
18
Coding Best Practices Frameworks and MVC Injection Protection
PDO SQL for PHP, SqlCommand() for .Net, createQuery() for Hibernate Stored procedures in the database White List input validation Escape all user supplied input Session Control Horizontal or vertical escalation of privilges Account for all error conditions Request a security assessment
20
Updating Patching Monitoring New features Decommissioning
Lifecycle Updating Patching Monitoring New features Decommissioning
21
How IT Can Help You…
22
What We Do… Notify you of 0-day (newly discovered) technology vulnerabilities; Notify you of your websites’/applications’ (scanned) vulnerabilities; Provide you with professional services to prevent small risks from becoming big incidents.
23
(Some of) Our Services…
Risk Assessment Vulnerability Mitigation Website/Application Development/Hardening
24
(ask for Miguel from Security)
Contact Us… @ help.unm.edu (ask for Miguel from Security)
25
Questions?
26
References
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.