O Preventing HTTP Request Smuggling Web Infrastructure Selection

Every device that is considered a part of the web application infrastructure needs to be securely configured to guarantee the security of the web application. If any part of the web application architecture is misconfigured, then the web application may be open to a variety of attacks.

Research and test web infrastructure components to ensure that vulnerabilities will not arise due to varying implementations of the relevant protocols. Devices such as application firewalls, intrusion detection and prevention systems, load balancers, web caches, web caching proxies, and web servers can all play a part in creating a vulnerability. These vulnerabilities may be much harder to rectify since the relevant vendors would have to alter their implementations of the HTTP protocol, or else the devices would need to be replaced.

When performing threat modeling and determining whether your web application should be hosted on the same server, or even within the same environment, as third-party web applications, take into account the risks posed by these third-party applications. If these risks are too high and cannot be mitigated, then you need either to move the web application to another environment or create a dedicated environment.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook

Post a comment