Orphaned pages

From Guidance Share

Jump to: navigation, search

Showing below up to 50 results starting with #51.
View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).

  1. Encrypt sensitive data if you need to store it
  2. Encrypt the contents of the authentication cookies.
  3. Encrypt the data or secure the communication channel.
  4. Engineering Practices Overview
  5. Ensure database connections are always closed
  6. Fail securely
  7. Firewall restrictions
  8. Guidance
  9. Guidance Overview
  10. How To: Delay Sign an Assembly in .NET 2.0
  11. How To: Perform a Security Code Review Review for Managed Code (Baseline Technique)
  12. How To: Use SecureString in .NET 2.0
  13. Impersonate original caller only when required
  14. Install URLScan on your Web server
  15. Keep unencrypted data close to the algorithm.
  16. Limit session lifetime.
  17. Log detailed error messages.
  18. Log key events.
  19. Login account configuration
  20. Logon auditing
  21. Maintain sensitive data on the server
  22. Maintain separate administration privileges.
  23. Make sure that users do not bypass your checks.
  24. News and Highlights
  25. Partition your Web site
  26. Personas at patterns & practices
  27. Place Web controls and user controls in separate assemblies
  28. Place resource access code in a separate assembly
  29. Protect authentication cookies.
  30. Protect credentials and authentication tickets
  31. Protect log files.
  32. Protect sensitive data in storage
  33. Protect sensitive data over the wire
  34. Protect session state from unauthorized access.
  35. Protect the credentials for SQL authentication
  36. Protect view state with MACs
  37. Protect your administration interfaces.
  38. Protect your configuration store.
  39. Protect your encryption keys.
  40. Require authentication for sensitive pages
  41. Require strong passwords.
  42. Resources Index
  43. Restrict the application in the database
  44. Restrict unauthorized callers
  45. Restrict unauthorized code
  46. Restrict user access to system-level resources.
  47. Retrieve sensitive data on demand.
  48. Sanitize Input
  49. Secure UDL files with restricted ACLs
  50. Secure restricted pages with SSL

View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).

Views
Personal tools