Security and Complexity
Security and Complexity
Mitigations Authentication and authorization mechanisms may be used to control access to the
registry. There are no centralized access control mechanisms that can protect the XML
messages, but message-level mechanisms such as encryption and digital signatures
can be used.
Table 6–2. Deception
Attack tactics An attack can try to spoof the identity of the service requester by sending a
well-formed message to the service provider. The identity of the service
provider could also be spoofed. XML messages are passed without integrity
protection by default. Without integrity protection, an attacker could tamper
with the XML message to execute code or gain privileges and information on
service requesters and providers.
Mitigations When service registries are used in Web services, they become a central organizing point for a large
amount of sensitive information about services. The service registry (and communication to and from the
service registry) should be hardened to the highest degree of assurance that is feasible in the system.
Vulnerability analysis of source code pays particular attention to system calls to privileged modules in the
operating system. The service registry can affect policy, runtime, and locale for other services and hence is
analogous in importance to the operating system. Therefore particular attention must be paid to how
service requesters access the service registry. At the message level, vendors are beginning to realize the
significant threat that viruses, when attached and posted with XML documents, may pose to the
environment. For systems that may have XML or binary attachments, virus protection services should be
deployed to scan XML and binary messages for viruses in a similar fashion to email messages—that is,
before the messages are executed for normal business operations.
REFERENCE
• SOFTWARE SECURITY ENGINEERING
• BY
• JULIAH ALLEN, SEAN BARNUM, ROBERT J ELLISON, GARY MCGRAW,
NANCY R MEAD
• PEARSON EDUCATION