Revision as of 08:50, 25 August 2008 by EoinKeary (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Secure application deployment

Outside of the actual code to review one must examine if the deployment of a web application is within a secure environment. Having secure code but the envronment upon which the code resides is a lost cause. Accessing resources directly muct be controlled within the environment;

Areas such as configuration files, directories, & resources which need authorisation need to be secured on the host such that direct access to such artifacts is disallowed.