How to do it...

  1. Assign to users/clients only those privileges that are strictly necessary for them to perform their duties and block access to everything else (the principle of least privilege).
  2. Ensure that the workflow's privileges are correctly checked and enforced at every step.
  3. Deny all access by default and then allow users to perform tasks/access information after an explicit verification of authorization.
  4. Users, roles, and authorizations should be stored in a flexible media, such as a database or a configuration file, so that they can be added, deleted, or updated. Do not hardcode them.
  5. Again, security through obscurity is not a good posture to take.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.178.157