.NET Framework Security
by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price
Summary
So what are the key points to take away from this chapter?
The most crucial aspect of securing a piece of software is the boundary between your code and code of lesser (or unknown) trust. This boundary can consist of public methods or other forms of communication such as files or network connections. Knowing this allows you to focus your efforts to secure your code on the places where it really matters; maximizing the use of your resources.
Be paranoid in your dealings with untrusted code. Assume that all code of lower trust is malicious and will try to use your interfaces in ways that don't match their intended purposes. This is important because the 99% case (well behaved, benign code) is not the security threat. The attacks on your ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access