100% found this document useful (1 vote)
201 views23 pages

CASE Java Course Outline

CASE Java Course Outline

Uploaded by

ram ram
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
100% found this document useful (1 vote)
201 views23 pages

CASE Java Course Outline

CASE Java Course Outline

Uploaded by

ram ram
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 23

Certified Application Security Engineer

Course Outline

Certified Application Security Engineer (CASE)


Course Outline
Module 01: Understanding Application Security, Threats, and Attacks
 What is a Secure Application
 Need for Application Security
 Most Common Application Level Attacks
 SQL Injection Attacks
 Cross-site Scripting (XSS) Attacks
 Parameter Tampering
 Directory Traversal
 Cross-site Request Forgery (CSRF) Attack
 Denial-of-Service (DoS) Attack
o Denial-of-Service (DoS): Examples
 Session Attacks
o Cookie Poisoning Attacks
o Session Fixation
 Why Applications become Vulnerable to Attacks
 Common Reasons for Existence of Application Vulnerabilities
 Common Flaws Existed due to Insecure Coding Techniques
 Improper Input Validation
 Insufficient Transport Layer Protection
 Improper Error Handling
 Insecure Cryptographic Storage
 Broken Authentication and Session Management
 Unvalidated Redirects and Forwards

Page | 1 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Insecure Direct Object References


 Failure to Restrict URL Access
 What Constitutes a Comprehensive Application Security?
 Application Security Frame
 3W’s in Application Security
 Insecure Application: A Software Development Problem
 Solution: Integrating Security in Software Development Life Cycle (SDLC)
 Functional vs Security Activities in SDLC
 Advantages of Integrating Security in SDLC
 Software Security Standards, Models, and Frameworks
 The Open Web Application Security Project (OWASP)
 OWASP TOP 10 Attacks-2017
 The Web Application Security Consortium (WASC)
 WASC Threat Classification
 Software Security Framework
o Software Assurance Maturity Model (SAMM)
o Building Security in Maturity Model (BSIMM)
 BSIMM vs OpenSAMM

Module 02: Security Requirements Gathering


 Importance of Gathering Security Requirements
 Security Requirements
 Gathering Security Requirements
 Why We Need Different Approach for Security Requirements Gathering
 Key Benefits of Addressing Security at Requirement Phase
 Stakeholders Involvement in Security Requirements Gathering
 Characteristics of Good Security Requirement: SMART
 Types of Security Requirements
o Functional Security Requirements
o Security Drivers
 Security Requirement Engineering (SRE)
Page | 2 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 SRE Phases
o Security Requirement Elicitation
o Security Requirement Analysis
o Security Requirement Specification
o Security Requirement Management
 Common Mistakes Made in Each Phase of SRE
 Different Security Requirement Engineering Approaches/Model
 Abuse Case and Security Use Case Modeling
 Abuse Cases
 Threatens Relationship
 Abuse Case Modeling Steps
 Abuse Cases: Advantages and Disadvantages
 Abuse Case Template
 Security Use Cases
 Security Use Cases are Abuse Case Driven
 Modeling Steps for Security Use Cases
 Mitigates Relationship
 Abuse Case vs Security Use Case
 Security Use Case: Advantages and Disadvantages
 Security Use Case Template
 Security Use Case Guidelines
 Example 1: Use Case for Online Bidding System
 Example 1: Abuse Case for Online Bidding System
 Example 1: Security Use Case for Online Bidding System
 Example 2: Use Case for ATM System
 Example 2: Abuse Case for ATM System
 Example 2: Security Use Case for ATM System
 Example 3: Use Case for E-commerce System
 Example 3: Abuse Case for E-commerce System
 Example 3: Security Use Case for E-commerce System

Page | 3 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Effectiveness of Abuse and Security Case


 Abuser and Security Stories
 Textual Description Template: Abuser Stories and Security Stories
 Examples: Abuser Stories and Security Stories
 Effectiveness of Abuser and Security Stories
 Abuser Stories: Advantages and Disadvantages
 Security Quality Requirements Engineering (SQUARE)
 SQUARE Effectiveness
 SQUARE Process
 SQUARE: Advantages and Disadvantages
 Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
 OCTAVE Effectiveness
 OCTAVE Steps
 OCTAVE: Advantages and Disadvantages

Module 03: Secure Application Design and Architecture


 Relative Cost of Fixing Vulnerabilities at Different Phases of SDLC
 Secure Application Design and Architecture
 Goal of Secure Design Process
 Secure Design Actions
 Security Requirement Specifications
 Secure Design Principles
 Threat Modeling
 Secure Application Architecture
 Secure Design Principles
 Define Secure Design principles
 Secure Design Principles
o Security through obscurity
o Secure the Weakest Link
o Use Least Privilege Principle
o Secure by Default
Page | 4 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

o Fail Securely
o Apply Defense in Depth
o Do Not Trust User Input
o Reduce Attack Surface
o Enable Auditing and Logging
o Keep Security Simple
o Separation of Duties
o Fix Security Issues Correctly
o Apply Security in Design Phase
o Protect Sensitive Data
o Exception Handling
o Secure Memory Management
o Protect Memory or Storage Secrets
o Fundamentals of Control Granularity
o Fault Tolerance
o Fault Detection
o Fault Removal
o Fault Avoidance
o Loose Coupling
o High Cohesion
o Change Management and Version Control
 Threat Modeling
 Threat Modeling Phases
o Attack Surface Evaluation
o Threat Identification
o Impact Analysis
o Control Recommendations
 Threat Modeling Process
o Identify Security Objective
o Application Overview
o Decompose Application

Page | 5 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

o Identify Threats
o Identify Vulnerabilities
 Identify Security Objective
o How to Identify Security Objectives
 Create an Application Overview
 Draw the End-to-End Deployment Architecture
 Identify Various User Roles
 Identify Use Cases Scenarios
 Identify Technologies
 Identify Application Security Mechanisms
 Decompose Application
 Prepare and Document Threat Model Information
o Example: Threat Model Information
 Identify the External Dependencies
o External Dependencies: Example
 Identify the Entry Points
o Entry Points: Example
 Identify the Assets
o Assets: Example
 Identify the Trust Levels
o Trust Levels: Example
 Define Trust Levels to Entry points
 Define Trust Levels to Assets
 Perform Application Modelling using Data Flow Diagrams (DFDs)
 Determine the Threats: Identify the Goal of an Attacker and Create Threat Profile
o Example: Attacker’s Goal/Threat Profile and Vulnerabilities Associated
 Determine the Threats: Create a Security Profile
 Identify the Threats
o The STRIDE Model
 Example: Threat Categorized and Identified using STRIDE
 Determine Countermeasures and Mitigation Security Controls

Page | 6 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Document the Threats


 Rating the Threats
o Rating the Threats: DREAD Model
 Secure Application Architecture
 Design Secure Application Architecture

Module 04: Secure Coding Practices for Input Validation


 Input Validation Pattern
 Validation and Security Issues
 Impact of Invalid Data Input
 Data Validation Techniques
 Input Validation using Frameworks and APIs
 Open Source Validation Framework for Java
 Servlet Filters
 Validation Filters for Servlet
 Data Validation using OWASP ESAPI
 Data Validation: Struts Framework
 Struts Validator
 Struts Validation and Security
 Data Validation using Struts Validator
 Avoid Duplication of Validation Forms
 Secure and Insecure Struts Validation Code
 Struts Validator Class
 Secure and Insecure Code for Struts Validator Class
 Enable the Struts Validator
 Secure and Insecure Struts Validator Code
 Struts 2 Framework Validator
 Struts 2 Framework: Built-in Data Validators
 Struts 2 Framework Annotation Based Validators
 Struts 2 Custom Validation: Workflow Interceptor
 Struts 2 Ajax Validation: jsonValidation Interceptor
Page | 7 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Data Validation: Spring Framework


 Spring Validator
 Data Validation: Spring MVC Framework
 Implementing Validator
 JSR 380 Bean Validator API
 Configuring JSR 380
 Custom Validator Implementation in Spring
 Spring Validation and Security
 Input Validation Errors
 Improper Sanitization of Untrusted Data
 Improper Validation of Strings
 Improper Logging of User Inputs
 Improper Incorporation of Malicious Inputs into Format Strings
 Inappropriate Use of Split Characters in Data Structures
 Improper Validation of Non-Character Code Points
 Improper Use of String Modification
 Improper Comparison of Locale-dependent Data
 Best Practices for Input Validation
 Common Secure Coding Practices
 SQL Injection
 Prepared Statement
 Stored Procedures
o Vulnerable and Secure Code for Stored Procedures
 Stored Procedure for Securing Input Validation
 Cross-site Scripting (XSS)
 Whitelisting vs Blacklisting
o Vulnerable and Secure Code for Blacklisting & Whitelisting
 Regular Expressions
o Vulnerable and Secure Code for Regular Expressions
 Character Encoding

Page | 8 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

o Vulnerable and Secure Code for Character Encoding


o Checklist for Character Encoding
 Cross-site Scripting (XSS) Countermeasures
 HTML Encoding
o Vulnerable and Secure Code for HTML Encoding
 HTML Encoding using ESAPI Encoder
 Cross-site Request Forgery (CSRF)
o Cross-site Request Forgery (CSRF) Countermeasures
 Directory Traversal
o Directory Traversal Countermeasures
 HTTP Response Splitting
o HTTP Response Splitting Countermeasures
 Parameter Manipulation and Countermeasures
 Protecting Application from Log Injection Attack
 XML Injection
 Command Injection
 LDAP Injection
 XML External Entity Attack
 Unrestricted File Upload Attack
 Prevent Unrestricted File Upload: Validate File Extension
 Injection Attacks Countermeasures
 CAPTCHA
o Sample Code for Creating CAPTCHA
o Sample Code for CAPTCHA Verification
o Sample Code for Displaying CAPTCHA
 Best Practices for Input Validation

Module 05: Secure Coding Practices for Authentication and Authorization


 Introduction to Authentication
 Java Container Authentication
 Authentication Mechanism Implementation
Page | 9 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Types of Authentication
 Declarative vs Programmatic Authentication
 Declarative Security Implementation
 Programmatic Security Implementation
 Java EE Authentication Implementation Example
 Basic Authentication
 How to Implement Basic Authentication?
 Form-based Authentication
 Form-based Authentication Implementation
 Implementing Kerberos-Based Authentication
 Secured Kerberos Implementation
 Client Certificate Authentication
 Certificate Generation with Keytool
 Implementing Encryption and Certificates in Client Application
 Authentication Weaknesses and Prevention
 Brute Force Attack
 Web-based Enumeration Attack
 Weak Password Attacks
 Introduction to Authorization
 JEE Based Authorization
o Declarative
o Programmatic
 Access Control Model
 Discretionary Access Control (DAC)
 Mandatory Access Control (MAC)
 Role-based Access Control (RBAC)
 Servlet Container
 Authorizing Users by Servlets
 EJB Authorization
 EJB Authorization Controls

Page | 10 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Declarative Security with EJBs


 Programmatic Security with EJBs
 Java Authentication and Authorization (JAAS)
 JAAS Features
 JAAS Architecture
 Pluggable Authentication Module (PAM) Framework
 JAAS Classes
 JAAS Subject and Principal
 Authentication in JAAS
o Authentication Steps in JAAS
 Authorization in JAAS
o Authorization Steps in JAAS
 Subject Methods doAs() and doAsPrivileged()
 Impersonation in JAAS
 JAAS Permissions
 LoginContext in JAAS
 Creating LoginContext
 LoginContext Instantiation
 JAAS Configuration
 Locating JAAS Configuration File
 JAAS CallbackHandler and Callbacks
 Login to Standalone Application
 JAAS Client
 LoginModule Implementation in JAAS
 Methods Associated with LoginModule
 LoginModule Example
 Phases in Login Process
 Java EE Security
 Java EE Application Architecture
 Java EE Servers as Code Hosts

Page | 11 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Declaring Roles
 HTTP Authentication Schemes
 Authorization Common Mistakes and Countermeasures
 Common Mistakes
 Authentication and Authorization in Spring Security Framework
 Spring Security Framework
 Spring Security Modules
 Spring Authentication
 Storing Username and Password
 Securing Authentication Provider
 Implementing HTTP Basic Authentication
 Form-based Authentication
 Implementing Digest Authentication
 Security Expressions
 URL-based Authorization
 JSP Page Content Authorization
 JSP Page Content Authorization with Domain Object’s ACL
 Method Authorization
 Configuring Anonymous Login
 Logout Feature Configuration
 Remember-Me Authentication
 Integrating Spring Security with JAAS
 Spring JAAS Implementation
 Defensive Coding Practices against Broken Authentication and Authorization
 Do Not Store Password in Java String Object
 Avoid Cookie based Remember-Me Use Persistent Remember-Me
 Implement Appropriate Session Timeout
 Prevent Session Stealing by Securing SessionID Cookie
 Secure Development Checklists: Broken Authentication and Session Management

Page | 12 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

Module 06: Secure Coding Practices for Cryptography


 Java Cryptography
 Need for Java Cryptography
 Java Security with Cryptography
 Java Cryptography Architecture (JCA)
 Java Cryptography Extension (JCE)
 Encryption and Secret Keys
 Attack Scenario: Inadequate/Weak Encryption
 Encryption: Symmetric and Asymmetric Key
 Encryption/Decryption Implementation Methods
 SecretKeys and KeyGenerator
 Implementation Methods of KeyGenerator Class
 Creating SecretKeys with KeyGenerator Class
 Cipher Class
 The Cipher Class
 Implementation Methods of Cipher Class
 Insecure Code for Cipher Class using DES Algorithm
 Secure Code for Cipher Class using AES Algorithm
 Digital Signatures
 Attack Scenario: Man-in-the-Middle Attack
 Digital Signatures
 The Signature Class
 Implementation Methods of Signature Class
 The SignedObjects
 Implementing Methods of SignedObjects
 The SealedObjects
 Implementation Methods of SealedObject
 Insecure and Secure Code for Signed/Sealed Objects
 Java XML Digital Signature
 Secure Socket Layer (SSL)

Page | 13 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Java Secure Socket Extension (JSSE)


 SSL and Security: Example 1
 SSL and Security: Example 2
 JSSE and HTTPS
 Insecure HTTP Server Code
 Secure HTTP Server Code
 Key Management
 Attack Scenario: Poor Key Management
 Keys and Certificates
 Key Management System
 KeyStore
 Implementation Method of KeyStore Class
 KeyStore: Persistent Data Stores
 Key Management Tool: KeyTool
 Digital Certificates
 Certification Authorities
 Signing Jars
 Signing JAR Tool: Jarsigner
 Signed Code Sources
 Insecure Code for Signed Code Sources
 Secure Code for Signed Code Sources
 Hashing
 Hashing Algorithms
 Securing Hashed Password with Salt
 Implementing Hashing with Salt in Spring Security
 Java Card Cryptography
 Spring Security: Crypto Module
 Crypto Module
 Spring Security Crypto Module
o Key Generators

Page | 14 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

o PasswordEncoder
 Implementing BCryptPasswordEncoder()
 Configuring BCryptPasswordEncoder() in Spring Security
 JavaScript Object Signing and Encryption (JOSE)
 Attacks against JWT, JWS and JWE
 Implementing JWS using Jose4J
 Implementing JWE using Jose4J
 Implementing JWK using Jose4J
 Dos and Don’ts in Java Cryptography
 Dos and Don’ts
o Avoid using Insecure Cryptographic Algorithms
o Avoid using Statistical PRNG, Inadequate Padding and Insufficient Key Size
o Implement Strong Entropy
o Implement Strong Algorithms
 Best Practices for Java Cryptography

Module 07: Secure Coding Practices for Session Management


 Session Management
 Session Tracking
 Session Tracking Methods
o HttpSession
o Cookies
 Setting a Limited Time Period for Session Expiration
 Preventing Session Cookies from Client-Side Scripts Attacks
o URL Rewriting
 Example Code for URL Rewriting
o Hidden Fields
o Session Objects
 Session Management in Spring Security
 Spring Session Management
 Session Management using Spring Security

Page | 15 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Restricting Concurrent Sessions per User using Spring Security


 Controlling Session Timeout
 Prevent using URL Parameters for Session Tracking
 Prevent Session Fixation with Spring Security
 Use SSL for Secure Connection
 Session Vulnerabilities and their Mitigation Techniques
 Session Vulnerabilities
 Types of Session Hijacking Attacks
 Countermeasures for Session Hijacking
 Countermeasures for Session ID Protection
 Best Practices and Guidelines for Secured Sessions Management
 Best Coding Practices for Session Management
 Checklist to Secure Credentials and Session IDs
 Guidelines for Secured Session Management

Module 08: Secure Coding Practices for Error Handling


 Introduction to Exceptions
 Exception and Error Handling
o Checked Exceptions
o Unchecked Exceptions
 Example of an Exception
 Handling Exceptions in Java
 Exception Classes Hierarchy
 Exceptions and Threats
 Erroneous Exceptional Behaviors
 Suppressing or Ignoring Checked Exceptions
 Disclosing Sensitive Information
 Logging Sensitive Data
 Restoring Objects to Prior State, if a Method Fails
 Avoid using Statements that Suppress Exceptions
 Prevent Access to Untrusted Code that Terminates JVM
Page | 16 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Never Catch java.lang.NullPointerException


 Never Allow methods to Throw RuntimeException, Exception, or Throwable
 Never Throw Undeclared Checked Exceptions
 Never Let Checked Exceptions Escape from Finally Block
 Dos and Don'ts in Error Handling
 Dos and Don'ts in Exception Handling
 Avoid using Log Error and Throw exception at Same Time
 Spring MVC Error Handling
 Handling Controller Exceptions with @ExceptionHandler Annotation
 Handling Controller Exceptions with HandlerExceptionResolver
 Spring MVC: Global Exception Handling
 Global Exception Handling: HandlerExceptionResolver
 Mapping Custom Exceptions to Statuscode with @ResponseStatus
 Configure Custom Error Page in Spring MVC
 Exception Handling in Struts 2
 Exception Handling: Struts 2
 Best Practices for Error Handling
 Best Practices for Handling Exceptions in Java
 Introduction to Logging
 Logging in Java
 Example for Logging Exceptions
 Logging Levels
 Logging using Log4j
 Log4j and Java Logging API
 Java Logging using Log4j
 Secure Coding in Logging
 Vulnerabilities in Logging
 Logging: Vulnerable Code and Secure Code
 Secured Practices in Logging

Page | 17 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

Module 09 Static and Dynamic Application Security Testing (SAST & DAST)
 Static Application Security Testing
 Static Application Security Testing (SAST)
 Objectives of SAST
 Why SAST
 Skills required for SAST
 What to look for in SAST
 Common Vulnerabilities Identified Through SAST
 Types of SAST
o Automated Source Code Analysis
o Manual Source Code Review
 Where does Secure Code Review Fit in SDLC?
 SAST Steps
 SAST Activities- flow Chart
 Recommendation for Effective SAST
 SAST Deliverable
 Automated Source Code Analysis
o Static Code Analysis using Checkmarx Static Code Analysis
o Static Code Analysis using Visual Code Grepper (VCG)
o Static Code Analysis using HP Fortify
o Static Code Analysis using Rational AppScan Source Edition
 Selecting Static Analysis Tool
 Manual Secure Code Review
 Manual Secure Code Review for Most Common Vulnerabilities
 Code Review for PCI DSS Compliance
 Code Review for Blacklisting Validation Approach
 Code Review for Client-side Validation Approach
 Code Review for Non-parametrized SQL Query
 Code Review for XSS Vulnerability
 Code Review for Weak Password Authentication

Page | 18 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Code Review for Hard-coded Passwords


 Code Review for Empty Password in Connection String
 Code Review for Insecure Basic Authentication
 Code Review for Open Redirect
 Code Review for Insecure LDAP Authentication
 Code Review for Insecure Authorization Mechanism
 Code Review for Weak Password Length
 Code Review for use of Weak Hashing Algorithm
 Code Review for Use of Weak Random Number Generator
 Code Review for Use of Insecure PBE Work Factor
 Code Review for use of Weak Encryption Algorithm
 Code Review for Use of Insufficient Encryption Key Size
 Code Review for Unsafe Decoding
 Code Review for Use of SSL
 Code Review for OS Command Injection
 Code Review for LDAP Injection
 Code Review for XML Injection
 Code Review for Unsafe use of request parameter to execute SQL Query
 Code Review for Insecure File Upload
 Code Review for Directory Traversal
 Code Review for Sensitive Information Exposure
 Code Review for Sensitive Information Leakage
 Code Review for Generic Exception Throwing and Catching
 Code Review for Cookies Vulnerable to Client-side Scripts Attacks
 Code Review for Cookies Vulnerable to CSRF Attacks
 Code Review for Enabling Directory Listing
 Code Review: Check List Approach
 Sample Checklist
o Input Validation
o Authentication

Page | 19 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

o Authorization
o Session Management
o Cryptography
o Exception Handling
o Logging
 SAST Finding
 SAST Report
 SAST Reporting
 Dynamic Application Security Testing (DAST)
 Types of DAST
o Automated Application Vulnerability Scanning
o Manual Application Penetration Testing
 SAST Vs DAST
 Automated Application Vulnerability Scanning Tools
 Web Application Security Scanners
o WebInspect
o IBM SecurityAppScan
 Additional Web Application Vulnerability Scanners
 Proxy-based Security Testing Tools
 Burp Suite
 OWASP Zed Attack Proxy (ZAP)
 Additional Proxy-based Security Testing Tools
 Choosing Between SAST and DAST

Module 10: Secure Deployment and Maintenance


 Secure Deployment
 Prior Deployment Activity
 Check the Integrity of Application Package Before Deployment
 Review the Deployment Guide Provided by the Software Vendor
 Deployment Activities: Ensuring Security at Various Levels
 Ensuring Security at Host Level

Page | 20 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Check and Configure the Security of Machine Hosting Web Server, Application
Server, Database Server and Network Devices
 Physical Security
 Host Level Security
 Ensuring Security at Network Level
 Network Level Security
o Router
o Firewall
o Switch
 Ensuring Security at Application Level
 Web Application Firewall (WAF)
o Benefits of WAF
o WAF Limitations
o WAF Vendors
 Ensuring Security at Web Container Level (Tomcat)
 Install and Configure Tomcat Securely
 Remove Server Banner
 Start Tomcat with Security Manager
 Configure Default Servlet Not to Serve Index Pages
 Replace Default Error Page
 Replace Default server.xml
 Protect Shutdown Port
 Restrict Access to Tomcat Manager Applications
 Protecting Resources with Realms
 Store Passwords as Digest
 Do Not Run Tomcat as Root
 Configure Restricted Datasets
 Session Handling using App Mode in Tomcat
 Role Based Security
 Securing Tomcat at Network level
 Java Runtime Security Configurations

Page | 21 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

 Tomcat General Security Setting


 Verify Trace Element Setting in sever.xml
 Verify CustomError Settings in web.xml
 Verify maxPostSize Setting
 Tomcat Security Checklist
 Checklist for Security Configuration in server.xml File in Apache Tomcat
 Tomcat High Availability
 Best Practices for Securing Tomcat
 Ensuring Security in Oracle
 Oracle Database General Security Overview
 Methods of Authentication in Oracle
 Authentication by Oracle Database
 Oracle Security Features
 Default Database Installation and Configuration Security
 Managing User Accounts Securely for the Site
 Securing User Accounts
 Password Management
 Lock all Expired Accounts
 Assign Users to Password Profile
 Disable Remote Operating System Authentication
 Securing Data
 Restrict Access to Operating System Directories
 Securing Database Installation and Configuration
 Securing Network
 How to Configure Encryption on the Client and the Server
 Control Access Data
 Virtual Private Database
 Oracle Label Security
 Database Vault
o Management and Reports

Page | 22 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline

o Disabling the Recycle Bin


 Audit Vault
 Built-in Audit Tools
o Standard Database Auditing
 Standard Auditing Enable Network Auditing
o Value Based Auditing
o Fine Grained Auditing (FGA)
 Recommended Audit Settings
 Security Maintenance and Monitoring
 Post Deployment Activities: Security Maintenance and Monitoring
 Security Maintenance Activities at OS Level
 Security Maintenance Activities at Web Container Level
 Security Maintenance Activities at Application Level

Page | 23 Certified Application Security Engineer Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like