50 likes | 254 Views
General Application Security Issues. Executing Commands with the Privileges of a Compromised Application If an attacker takes over an application, the attacker can execute commands with the privileges of that application Many applications run with super user (root) privileges.
E N D
General Application Security Issues • Executing Commands with the Privileges of a Compromised Application • If an attacker takes over an application, the attacker can execute commands with the privileges of that application • Many applications run with super user (root) privileges
General Application Security Issues • Few Operating Systems But Many Applications • Application hardening is more total work than operating system hardening • Application Security Actions • Understanding the server’s role and threat environment • If it runs only one or a few services, easy to disallow irrelevant things
General Application Security Issues • Application Security Actions • Basics • Physical security • backup • harden the operating system • Minimize applications • Main applications • Subsidiary applications • Be guided by security baselines
General Application Security Issues • Application Security Actions • Minimize the permissions of applications • In UNIX, use chroot to put application in a directory • Attacks will be limited to this directory and subdirectories • However, chroot protection can be broken, especially by root applications for which it is most critical
General Application Security Issues • Application Security Actions • Add application layer authentication • Implement cryptographic systems • Delete optional learning aids • Install patches • Consider isolating programs from data