Preventing Hosted Application Insertion Attacks
This issue refers to an agent or someone else inserting a hosted application into the CCF infrastructure.
To attack in this way, the attacker must modify the CCF databases. To protect the infrastructure against application insertion attacks, you should configure the databases to log any changes, and you should set permissions so that only trusted administrators can modify them.
Show: