Confidentiality

  • TLS
  • Keys and Certs
  • HTTPS
    Least Privilege:
  • Only allow users to access the resources they need
  • Prevent exposing unnecessary information about the server/application itself
    File System Protection:
  • Set appropriate permission on web content, scripts and configuration files
  • Prevent “file inclusion” vulnerabilities
    Data Store Protection
  • Prevent unauthorized

Integrity

  • Hash/Checksum/Message Digest
  • Protect resources by requiring authentication
  • Protect authentication credentials using secure technologies
    Ensuring data doesn’t change:
  • Preventing man-in-the-middle attacks
    Prevent File System Changes:
  • Monitor file-system for unauthorized changes
  • Read-only permissions to web content whenever possible
    Server-side script protections:
  • Prevent script execution when not needed

Other

  • SElinux OS protection tools
  • Security modules for web server (mod_security for apache)
  • Denial of server protection
  • Web-Application Firewall