TAILIEUCHUNG - Microsoft SQL Server 2008 R2 Unleashed- P43

Microsoft SQL Server 2008 R2 Unleashed- P43:SQL Server 2005 provided a number of significant new features and enhancements over what was available in SQL Server 2000. This is not too surprising considering there was a five-year gap between these major SQL Server 2008 is not as much of a quantum leap forward from SQL Server 2005 | 364 CHAPTER 13 Security and Compliance The Open Web Application Security Project OWASP lists its recent top 10 application vulnerabilities as follows SQL Injection Cross-Site Scripting Broken Authentication and Session Management Insecure Direct Object References Cross-Site Request Forgery Security Misconfiguration Failure to Restrict URLs Unvalidated Redirects and Forwards Insecure Cryptographic Storage Insufficient Transport Layer Protection Identity Access Management Components One of the key areas identified in the security big picture as you can see looking back at Figure is identity management. It is key in the sense that well-managed identities are essential to well-managed security. There is a quite a bit to consider when talking about identities. Figure shows a common identity universe for a company that has both internal- and external-facing applications. In other words identities are both customers that interact with the business and internal identities such as employees and other workforce identities contractors temps partners and so on . Both sets of identities must be managed well and often there are overlapping identities that require accesses and identity management in both areas internal and external . Often companies use one internal-facing LDAP directory such as Microsoft s Active Directory for managing their internal identities and then another LDAP directory such as Sun One LDAP for managing all external-facing identities for forums eStore and so on . Then they create triggers or synchronization jobs that do a search before create type of processing when new identities are created within either LDAP directory. Because overlap is rare not much extra create overhead occurs but when they do overlap only one identity such as a partner identity that might be in that company s internal and external LDAP directories gets created. This is effectively mastering the user identities. It is recommended that you consider both sources

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.