- The design has a standardized approach to exception handling across the application.
- In the case of an exception minimum amount of information is returned to the user.
- Lowest level exceptions are encapsulated into a relevant exception for the benefit of the above tiers of the application. (For e.g.. Instead of telling that a certain row/column of the database could not be accessed, it is better to inform a plain "access denied")
- Where user actions are being logged, private data should not be written to the log. (e.g.. Changed passwords, critical settings etc.)
- The key parameters to be logged and audited have been identified.
- The application has levels of auditing and logging.
- Application logs have been protected from tampering.
- Application logs have been protected from unauthorized access.
- Utilities have been factored in for interpretation of log files.
Friday, October 27, 2006
Security considerations when auditing and logging in applications
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment