Skip to content

Commit 9614a5d

Browse files
authored
SCP [198, 201, 143, 144, 145, 146, 147, 148, 150] Cornucopia - Data Protection (#130)
* Fixes #129 SCP [198, 201, 143, 144, 145, 146, 147, 148, 150] Cornucopia - Data Protection * Fixes #129 SCP [198, 201, 143, 144, 145, 146, 147, 148, 150] Cornucopia - Data Protection * Fixes #129 remove mobile references
1 parent b727500 commit 9614a5d

File tree

2 files changed

+17
-0
lines changed

2 files changed

+17
-0
lines changed

.wordlist-en.txt

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -536,3 +536,7 @@ BOLA
536536
WebDAV
537537
tunable
538538
allowlist
539+
printf
540+
strcat
541+
strcpy
542+
unencrypted

docs/en/04-design/02-web-app-checklist/08-protect-data.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ and use the list below as suggestions for a checklist that has been tailored for
2222
12. Purge those temporary copies of sensitive data as soon as they are no longer required
2323
13. Do not include sensitive information in the URL or query string, such as an API key or session token
2424
14. Disable client side caching on pages containing sensitive information (e.g. Cache-Control: no-store)
25+
15. Set a referrer policy to prevent leakage of sensitive data to third-party services via the 'Referer' HTTP request header
26+
field. This can be done using the Referrer-Policy HTTP response header field or via HTML element attributes
2527

2628
#### 2. Memory management
2729

@@ -33,11 +35,21 @@ and use the list below as suggestions for a checklist that has been tailored for
3335
6. Properly free allocated memory upon the completion of functions and at all exit points
3436
7. Overwrite any sensitive information stored in allocated memory at all exit points from the function
3537
8. Protect shared variables and resources from inappropriate concurrent access
38+
9. Avoid the use of known vulnerable functions (e.g., printf, strcat, strcpy etc.)
39+
40+
#### 3. Encrypting Data in Transit
41+
42+
1. Utilize TLS connections for all connectivity between a client and external-facing, HTTP-based services
43+
2. Ensure the TLS connections do not fall back to insecure or unencrypted communication
44+
3. Utilize a single standard TLS implementation with (preferably the latest) secure version of TLS
45+
4. Ensure the TLS connections are configured appropriately to validate certificates received before communicating and
46+
checking revocation status
3647

3748
#### References
3849

3950
* OWASP [Cheat Sheet: Cryptographic Storage][cscs]
4051
* OWASP [Cheat Sheet: Secrets Management][cssm]
52+
* OWASP [Cheat Sheet: Transport Layer Security][cstls]
4153
* OWASP [Top 10 Proactive Controls][proactive10]
4254

4355
----
@@ -49,6 +61,7 @@ then [submit an issue][issue060208] or [edit on GitHub][edit060208].
4961
[control2]: https://top10proactive.owasp.org/the-top-10/c2-crypto/
5062
[cscs]: https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet
5163
[cssm]: https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet
64+
[cstls]: https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Security_Cheat_Sheet.html
5265
[edit060208]: https://github.com/OWASP/DevGuide/blob/main/docs/en/04-design/02-web-app-checklist/08-protect-data.md
5366
[issue060208]: https://github.com/OWASP/DevGuide/issues/new?labels=enhancement&template=request.md&title=Update:%2004-design/02-web-app-checklist/08-protect-data
5467
[proactive10]: https://top10proactive.owasp.org/

0 commit comments

Comments
 (0)