Hacking the Code ASP.NET Web Application Security [Electronic resources]

James C. Foster, Mark M. Burnett

نسخه متنی -صفحه : 96/ 56
نمايش فراداده

Coding Audit Fast Track

Applying XML Encryption

Encrypting XML Data

Does the application encrypt the document using only well-established encryption algorithms, avoiding weak encryption methods and encoding techniques?

Is all the sensitive data encrypted?

Are the keys used for encryption stored securely?

If the code does not include EncryptionMethod or EncryptedKey elements, has a policy already been established so that the recipient knows this information?

Does the recipient of the encrypted data actually need to access the data?

Applying XML Digital Signatures

Signing XML Data

Does the application sign the document using only well-established encryption algorithms, avoiding weak encryption methods and encoding techniques?

Are the keys used for signing stored securely?

If encryption and signing are used together, have the parties agreed to a policy regarding whether encryption is applied before or after signing?