Web Services Security Frame

Hot Spots Description
Auditing and Logging Auditing and logging refers to how security-related events are recorded, monitored, and audited.
Authentication Authentication is the process where an entity proves the identity of another entity, typically through credentials, such as a user name and password.
Authorization Authorization is how your service provides access controls for resources and operations.
Configuration Management What information is configurable? How to protect configuration information? Configuration management refers to how your service handles database connections, administration and other configuration settings.
Exception Management Exception management refers to how you handle exceptions within your application, including fault contracts.
Impersonation/Delegation Impersonation and delegation refers to how your service impersonates users and passes identity information downstream for authorization purposes.
Message Encryption Message encryption refers to protecting a message by converting the contents to cipher-text using cryptographic methods.
Message Replay Detection Message replay detection refers to identifying and rejecting messages that are re-submitted.
Message Signing Message signing refers to signing a message with a digital signature using cryptographic methods, to confirm the source of the message and detect if the contents have been tampered with (i.e. authentication and integrity of the message.)
Sensitive Data Sensitive data includes data integrity and confidentiality of your user and application data that you need to protect. This includes how you protect sensitive data from being stolen from memory, from configuration files or when transmitted over the network.
Session Management A session refers to a series of related interactions between a client and your service.
Validation Message validation refers to how you verify the message payload against schema, as well as message size, content and character sets. This includes how your service filters, scrubs and rejects input and output before additional processing. Input and output includes input from clients consuming the service as well as file-system input, as well as input from network resources, such as databases. Output typically includes the return values from your service or disk / database writes among others.

Last edited Aug 18, 2009 at 2:11 AM by paulenfield, version 1


No comments yet.