Question: Research a secure web application architecture accounting for application and operating system vulnerabilities based on the Common Vulnerability Scoring System ( CVSS ) . The

Research a secure web application architecture accounting for application and operating system vulnerabilities based on the Common Vulnerability Scoring System (CVSS). The base operating system will be RedHat Linux, Apache, MySQL, and PHP. Known as the LAMP stack this development stack will provide the opportunity to model a real-world secure architecture. SQL injection is the topic you will research the vulnerability and provide an overview of the vulnerability including a threat model on threats associated with your topic, and finally an applicable ASVS controls that help secure a web application from your specific vulnerability. On a more abstract level, design a secure and resilient application architecture to protect transactions as they pass through an enterprise environment. Think of it in eliminating any single points of failure. For example, a single firewall or database server would cause a transaction to fail if one of those components were unavailable. Report Sections Include the following sections in your Report: Introduction This section will include specific information about your topic and why it is dangerous. Vulnerability This section will focus on the LAMP stack and 2 vulnerabilities from each component of WAMP. Threat Model Secure Architecture Design Final Project Version 4 This section will contain a threat model showing STRIDE threats specific to your project topic. Proposed Resilient Architecture This section will show a secure and resilient architecture designed by you to ensure the web application is available and secure to the users. Compensating Controls This section includes ASVS controls applicable to the topic you were assigned. Conclusion Closing thoughts and summary. Final Presentation Requirements 10-minute PowerPoint presentation: 1. Introduction 2. LAMP Vulnerabilities 3. Threat Model 4. Proposed Resilient Architecture 5. Compensating Controls Introduce the paper and what it will cover. Research and provide any vulnerabilities currently available for the software stack on the web server. Provide a threat model diagram and associated logic to support the model. Define a multi-tier, enterprise security architecture based on a resilient components that eliminate any single points of failure. Provide compensating controls that cover a least four ASVS items relevant to the OWASP vulnerability selected. Provide a detailed background on Injection. Maximum of two vulnerabilities per system component: OS, Web Server, Database, and Language for a total of eight items. o Example: Linux vulnerability x2=2, Apache vulnerability x 2=2, MySQL vulnerability x2=2, and PHP vulnerability x2=2 for a total of 8 items. Complete threat model including at least five STRIDE threats that can affect the overall system. Proposed secure and resilient architecture including multitier application, security devices, database, and multiple security zones. You must include Threat Model and proposed Enterprise Architecture DIAGRAM in your paper. These are NOT the same diagram. Minimum of four ASVS 4.0 controls to be implemented to secure the system(s) against the vulnerabilities discovered.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!