Summary
In this chapter, we have reviewed the common points of risk in an unsecured web application and the basic architecture of our example application. We began by scrutinizing the audit results, highlighting the areas of concern and potential vulnerabilities. The chapter then branched into key security concepts, including authentication, authorization, and database credential security. We also discussed the strategies for securing the application based on the spring framework.
In the next chapter, we’ll explore how to get Spring Security set up quickly and get a basic understanding of how it works.