Download presentation
Presentation is loading. Please wait.
Published byAnn Fisher Modified over 8 years ago
1
Chapter 17– Attacking Application Architecture Hareesh Lingareddy
2
Tiered Architectures Attacking Tiered Securing Tiered Cloud Attacking Cloud Securing Cloud
3
Multitier architecture common 3-tier architecture Advantages Reuse Parallel work
4
Exploiting Trust Relationships Application tier Programming errors Subverting Other Tiers Using file read access to extract MySQL data Limited Compromise
5
Minimize Trust Relationships Role-based access controls Usage of various accounts Segregate Different Components Limited access to files Filtered network level access All Defense in Depth Encrypting sensitive data
8
Possible sections of attack Governance Data Architecture Applications Assurance Token based access Web storage
9
Secure Customer Access Robust authentication Privilege based access Segregate Customer Functionality
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.