Identifying Known Threats

It is important that you identify the threats to your Commerce Server installation. You need to consider the possibility of threats to the following types of data:

  • Configuration data: connection strings to databases
  • Authentication data: user names and passwords stored in your Profiles database.
  • Persistent data: data stored and used by Commerce Server processes such as SQL Server data, XML data, registry data, files, authentication and authorization data, and logs.
  • Data that travels over communications channels: cookies, authentication information, purchasing and ordering information, and credit card numbers.
  • State data: data that indicates whether the user is logged in or logged out, and data stored in shopping baskets.
  • Temporary data: data that is created by the processes running the site.

To identify the threats to this data, you should outline the overall architecture of your system, including:

  • Core processes, such as executables, COM objects, and services.
  • Configuration data, authentication data, persistent data, and data that travels over communication channels.
  • Communication channels used between the processes, including sockets, pipes, remote procedure calls (RPCs), Distributed Component Object Model (DCOM), TCP/IP, and Simple Object Access Protocol (SOAP).

Then, hold a meeting that includes at least one member from each of the disciplines in your organization, for example, a Web designer, a developer, a system administrator, and a technical writer. Review the overall architecture and attempt to identify as many security threats as possible. The objective of this meeting is to identify potential threats, not to solve the problems they present.

Create a table that lists the core processes, persistent and temporary data, and communications protocols for your application, such as the following sample table.

Component or Protocol Comments
Browser This is used by the client to view profile and order information.
Hypertext Transfer Protocol. (HTTP) The browser communicates with the Web server by using HTTP.
Web server The Web server creates the HTML data that the browser renders.
Web pages The Web pages are written as Active Server Pages (ASP).
Authentication data This is used to authenticate registered users.
Database server Commerce Server includes stored procedures used to access run-time and design-time data.

In the next stage, you will group and analyze the threats to these components and protocols.

This section contains:

Copyright © 2005 Microsoft Corporation.
All rights reserved.