Chapter 10. Securing the Business Tier–Design Strategies and Best Practices

In Chapter 9, we discussed the security patterns and best practices related to the Web tier. In this chapter, we will examine security patterns and best practices applicable to the Business tier. The Business tier comprises components responsible for implementing the business logic in the application. These patterns build upon those outlined in Core J2EE Patterns [CJP2]. They assume use of certain J2EE patterns and best practices mentioned there as well as industry-recognized approaches.

We will begin by briefly stating prominent security considerations ...

Get Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.