ISSN : 2583-2646

Enhancing Web Security in Java Applications: A Deep Dive into Spring Security Framework

ESP Journal of Engineering & Technology Advancements
© 2023 by ESP JETA
Volume 3  Issue 2
Year of Publication : 2023
Authors : Tirumala Ashish Kumar Manne
:10.56472/25832646/JETA-V3I6P115

Citation:

Tirumala Ashish Kumar Manne, 2023. "Enhancing Web Security in Java Applications: A Deep Dive into Spring Security Framework ESP Journal of Engineering & Technology Advancements" 3(2): 179-185.

Abstract:

Also, for Java based applications, various kind of enterprise operations can be provided. The aim of this paper is to review the Spring Security, a scalable, customizable, Java security framework that is used for authentication and access-control features, which is added to the Web application with the Java Platform. I consider its structure, components and capabilities, like session management, role based access models, protection against CSRF, OAuth2 and/or JWT integration. I show a concrete way you can ward off the attacks of the common threats found in the OWASP Top 10 using Spring Security via example cases. I illustrate some of the implementation details and practical perfomance considerations of Spring Security when comparing it to Java security implementations like Apache Shiro, Java Security and JAAS. The last section of the paper will wrap up by providing you with and sharing best practice principles of a secure configuration, coupled with a summary of recent things you can explore, such as cloud-native security improvements as well as how you can support embedding Zero Trust into your estate. The main goal of this work is to provide theoretical knowledge and practical guidelines for developers, architects and security practitioners so that they could employ Spring Security for secure Java applications.

References:

[1] OWASP Foundation, "OWASP Top Ten Web Application Security Risks – 2021", [https://owasp.org/www-project-top-ten/], Accessed: May 2023.

[2] B. Fisher and B. Pollack, Spring Security in Action, Manning Publications, 2020.

[3] M. Cano, Spring Security - Third Edition, Packt Publishing, 2019.

[4] B. Evans, “Spring Security – A Powerful and Customizable Authentication and Access-Control Framework,” Java Magazine, vol. 21, pp. 34–38, Mar. 2020.

[5] R. Winch, Official Spring Security Documentation, Pivotal Software, Inc., [https://docs.spring.io/spring-security/reference/], Accessed: Apr. 2023.

[6] M. Cano, Mastering Spring Security, Packt Publishing, 2021.

[7] J. Turnbull, Securing Applications with OAuth2 and JWT, Red Hat Developer Series, 2020.

[8] R. Winch, “Spring Security Architecture,” Spring Blog, Pivotal Software, 2021. [Online]. Available: [https://spring.io/blog].

[9] M. Cano, Spring Security - Third Edition, Packt Publishing, 2019.

[10] S. Gupta, “Understanding CSRF and How Spring Security Handles It,” International Journal of Computer Applications, vol. 182, no. 23, pp. 12–16, Mar. 2019.

[11] B. Pollack and B. Fisher, Spring Security in Action, Manning Publications, 2020.

[12] OWASP Foundation, “OWASP Secure Headers Project,” [https://owasp.org/www-project-secure-headers/], Accessed: May 2023.

[13] R. Winch, Spring Security Reference: Custom Authentication, VMware, 2022. [Online]. Available: [https://docs.spring.io/spring-security/reference/servlet/authentication/architecture.html]

[14] M. Cano, Mastering Spring Security 5.7, Packt Publishing, 2022.

[15] B. Pollack and B. Fisher, Spring Security in Action, Manning Publications, 2020.

[16] B. Evans and M. Ferguson, “Advanced Authorization with Spring Security,” JavaOne Conference Proceedings, Oracle, 2021.

[17] S. Sharma, Spring Boot Security – Implementing Password Encryption, Apress, 2020.

[18] R. Winch, Official Spring Security Reference, Pivotal Software, [https://docs.spring.io/spring-security/reference/], Accessed: May 2023.

[19] K. Li, “Evaluating Web Application Security Using Spring Security,” IEEE Access, vol. 8, pp. 200412–200425, 2020.

[20] L. Williams, Apache Shiro Essentials, Packt Publishing, 2015.

[21] M. Cano, Mastering Spring Security 5.7, Packt Publishing, 2022.

[22] Oracle, “JAAS Reference Guide,” Java Platform, Standard Edition 8, [https://docs.oracle.com/javase/8/docs/technotes/guides/security/jaas/JAASRefGuide.html], Accessed: May 2023.

[23] B. Evans and M. Ferguson, “Integrating JAAS and Spring Security for Hybrid Applications,” JavaOne Conference, Oracle, 2020.

[24] A. Ramesh and K. R. Srinivasan, “Performance Analysis of Java Security Frameworks in Microservices Architecture,” IEEE Transactions on Software Engineering, vol. 47, no. 6, pp. 1220–1232, Jun. 2021.

[25] OWASP Foundation, “OWASP Application Security Verification Standard 4.0,” [https://owasp.org/www-project-application-security-verification-standard/], Accessed: May 2023.

[26] B. Pollack and B. Fisher, Spring Security in Action, Manning Publications, 2020.

[27] R. Winch, “Fine-Grained Authorization in Spring Security,” Spring Blog, Pivotal Software, 2021.

[28] M. Cano, Mastering Spring Security 5.7, Packt Publishing, 2022.

[29] J. Turnbull, Securing Applications with OAuth2 and JWT, Red Hat Developer Series, 2020.

[30] S. Gupta, “Understanding CSRF in Spring Security,” International Journal of Computer Applications, vol. 182, no. 23, 2019.

[31] N. Parveen and M. Hussain, “Session Management Vulnerabilities and Security Strategies,” IEEE Access, vol. 9, pp. 112345–112360, 2021.

[32] L. Evans, “Spring Security Filter Chain Explained,” Java Code Geeks, 2020.

[33] B. Morgan, “Security Event Logging and Monitoring in Java Web Applications,” Software Security Journal, vol. 14, no. 2, pp. 88–94, 2022.

Keywords:

Web Application Security, OAuth2, JWT, Spring Security, JAAS.