You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/the-top-10/c1-accesscontrol.md
+3
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,11 @@
3
3
## Description
4
4
5
5
Access Control (or Authorization) is allowing or denying specific requests from a user, program, or process. With each access control decision, a given subject requests access to a given object. Access control is the process that considers the defined policy and determines if a given subject is allowed to access a given object.
6
+
6
7
Access control also involves the act of granting and revoking those privileges.
8
+
7
9
Access Control often applies on multiple levels, e.g., given an application with a database backend, it applies both on the business logic level as well as on a database row level. In addition, applications can offer multiple ways of performing operations (e.g., through APIs or the website). All those different levels and access paths must be aligned, i.e., use the same access control checks, to protect against security vulnerabilities.
10
+
8
11
Authorization (verifying access to specific features or resources) is not equivalent to authentication (verifying identity).
Copy file name to clipboardexpand all lines: docs/the-top-10/c10-stop-server-side-request-forgery.md
+4-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,9 @@
2
2
3
3
## Description
4
4
5
-
While Injection Attacks typically target the victim server itself, Server-Side Request Forgery (SSRF) attacks try to coerce the server to perform a request on behalf of the attacker. Why is this beneficial for the attacker? The outgoing request will be performed with the identity of the victim server and thus the attacker might execute operations with elevated operations.
5
+
While Injection Attacks typically target the victim server itself, Server-Side Request Forgery (SSRF) attacks try to coerce the server to perform a request on behalf of the attacker. SSRF occurs when an attacker can trick a server into making unintended requests to internal or external services, potentially bypassing security controls.
6
+
7
+
Why is this beneficial for the attacker? The outgoing request will be performed with the identity of the victim server and thus the attacker might execute operations with elevated operations.
6
8
7
9
## Threats
8
10
@@ -19,6 +21,7 @@ There multiple ways of preventing SSRF:
19
21
- Input validation
20
22
- If outgoing requests have to be made, check the target against an allow-list
21
23
- If using XML, configure parser securely to prevent XEE
24
+
22
25
Be aware of [Unicode and other Character transformations](https://cheatsheetseries.owasp.org/assets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet_Orange_Tsai_Talk.pdf) when performing input validation.
Copy file name to clipboardexpand all lines: docs/the-top-10/c2-crypto.md
+4-2
Original file line number
Diff line number
Diff line change
@@ -42,8 +42,10 @@ When it comes to cryptography, there are a few simple rules:
42
42
### Protect data at rest
43
43
44
44
The first rule of sensitive data management is to avoid storing sensitive data when at all possible. If you must store sensitive data then make sure it is cryptographically protected in some way to avoid unauthorized disclosure and modification.
45
+
45
46
Cryptography (or crypto) is one of the more advanced topics of information security and one whose understanding requires the most schooling and experience. It is difficult to get right because there are many approaches to encryption, each with advantages and disadvantages that need to be thoroughly understood by web solution architects and developers. In addition, serious cryptography research is typically based on advanced mathematics and number theory, providing a serious barrier to entry.
46
-
Designing or building cryptographic algorithms is very error-prone (see side-channel attacks). Instead of building cryptographic capability from scratch, it is strongly recommended that peer-reviewed and open solutions be used, such as the Google `Tink` project, `Libsodium`, and secure storage capability built into many software frameworks and cloud services.
47
+
48
+
Designing or building cryptographic algorithms is very error-prone (see side-channel attacks). Instead of building cryptographic capability from scratch, it is strongly recommended that peer-reviewed and open solutions be used, such as the [Google Tink](https://developers.google.com/tink) project, [Libsodium](https://doc.libsodium.org/), and secure storage capability built into many software frameworks and cloud services.
47
49
48
50
#### Store passwords safely
49
51
@@ -74,7 +76,7 @@ Attackers can steal data from web and web service applications in a number of wa
74
76
75
77
#### Use current cryptographic protocols
76
78
77
-
When developing web applications, use TLSv1.2 or TLSv1.3, preferably TLSv1.3. If possible, investigate the usage of HTTP/2 or HTTP/3 as they warrant the usage of security TLS versions/algorithms.
79
+
When developing web applications, you will typically use[Transport Layer Security (TLS)](https://en.wikipedia.org/wiki/Transport_Layer_Security) for encryption during transit. Use TLSv1.2 or TLSv1.3, preferably TLSv1.3. If possible, investigate the usage of HTTP/2 or HTTP/3 as they warrant the usage of security TLS versions/algorithms.
78
80
79
81
- Directly turn off other older protocols to avoid protocol downgrade attacks.
80
82
- Do not offer HTTP. Disable both HTTP and SSL compression.
Copy file name to clipboardexpand all lines: docs/the-top-10/c3-validate-input-and-handle-exceptions.md
+2
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,9 @@ Regular expressions are just one way to accomplish validation. Regular expressio
72
72
#### Unexpected User Input (Mass Assignment)
73
73
74
74
Some frameworks support automatic binding of HTTP requests parameters to server-side objects used by the application. This auto-binding feature can allow an attacker to update server-side objects that were not meant to be modified. The attacker can possibly modify their access control level or circumvent the intended business logic of the application with this feature.
75
+
75
76
This attack has a number of names including: mass assignment, autobinding and object injection.
77
+
76
78
As a simple example, if the user object has a field privilege which specifies the user’s privilege level in the application, a malicious user can look for pages where user data is modified and add privilege=admin to the HTTP parameters sent. If auto-binding is enabled in an insecure fashion, the server-side object representing the user will be modified accordingly.
Copy file name to clipboardexpand all lines: docs/the-top-10/c5-secure-by-default.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,9 @@
2
2
3
3
## Description
4
4
5
-
“Secure-by-Default” means products are resilient against prevalent exploitation techniques out of the box without additional charge. The benefit of having an application secure from the start is that it removes the burden away from developers on how to lock a system down, providing them with an already secure product. It reduces the effort required to deploy products in a secure manner and gives greater confidence that they will remain secure over time.
5
+
“Secure-by-Default” means products are resilient against prevalent exploitation techniques out of the box without additional charge. Software should start in a secure state without requiring extensive user configuration, ensuring the default settings are always the most secure option.
6
+
7
+
The benefit of having an application secure from the start is that it removes the burden away from developers on how to lock a system down, providing them with an already secure product. It reduces the effort required to deploy products in a secure manner and gives greater confidence that they will remain secure over time.
Copy file name to clipboardexpand all lines: docs/the-top-10/c6-use-secure-dependencies.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,9 @@
2
2
3
3
## Description
4
4
5
-
It is a common practice in software development to leverage libraries and frameworks. Secure libraries and software frameworks with embedded security help software developers prevent security-related design and implementation flaws. A developer writing an application from scratch might not have sufficient knowledge, time, or budget to properly implement or maintain security features. Leveraging security frameworks (both open source and vendor) help accomplish security goals more efficiently and accurately.
5
+
It is a common practice in software development to leverage libraries and frameworks. Secure libraries and software frameworks with embedded security help software developers prevent security-related design and implementation flaws.
6
+
7
+
A developer writing an application from scratch might not have sufficient knowledge, time, or budget to properly implement or maintain security features. Leveraging security frameworks (both open source and vendor) help accomplish security goals more efficiently and accurately.
6
8
7
9
When possible, the emphasis should be on using the existing secure features of frameworks rather than importing yet another third party libraries, which requires regular updates and maintenance. It is preferable to have developers take advantage of what they're already using instead of forcing yet another library on them.
Copy file name to clipboardexpand all lines: docs/the-top-10/c7-secure-digital-identities.md
+11
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ Digital Identity is a unique representation of an individual, organization (or a
6
6
7
7
Session management is the process by which a server maintains the state of the user’s authentication so that the user may continue to use the system without re-authenticating.
8
8
Digital identity, authentication, and session management are very complex topics. We're scratching the surface of the topic of Digital Identity here. Ensure that your most capable engineering talent is responsible for maintaining the complexity involved with most Identity solutions.
9
+
9
10
The [NIST Special Publication 800-63B: Digital Identity Guidelines (Authentication and Life Cycle Management](https://pages.nist.gov/800-63-3/sp800-63b.html) provide solid guidance on implementing digital identity, authentication, and session management controls. Below are some recommendations for secure implementation to ensure strong digital identity controls are implemented in applications.
10
11
11
12
### Authentication Assurance Levels
@@ -19,12 +20,15 @@ NIST 800-63b describes three levels of authentication assurance called Authentic
19
20
#### Level 2 : Multi-Factor Authentication
20
21
21
22
NIST 800-63b AAL level 2 is reserved for higher-risk applications that contain "self-asserted PII or other personal information made available online." At AAL level 2 multi-factor authentication is required including OTP or other forms of multi-factor implementation.
23
+
22
24
Multi-factor authentication (MFA) ensures that users are who they claim to be by requiring them to identify themselves with a combination of:
23
25
24
26
- Something you know – password or PIN
25
27
- Something you own – token or phone, when using a phone please use a standard authenticator application heeding standardized protocols such as FIDO2.
26
28
- Something you are – biometrics, such as a fingerprint
29
+
27
30
Using passwords as a sole factor provides weak security. Multi-factor solutions provide a more robust solution by requiring an attacker to acquire more than one element to authenticate with the service.
31
+
28
32
It is worth noting that biometrics, when employed as a single factor of authentication, are not considered acceptable secrets for digital authentication. They can be obtained online or by taking a picture of someone with a camera phone (e.g., facial images) with or without their knowledge, lifted from objects someone touches (e.g., latent fingerprints), or captured with high-resolution images (e.g., iris patterns). Biometrics must be used only as part of multi-factor authentication with a physical authenticator (something you own). For example, accessing a multi-factor one-time password (OTP) device will generate a one-time password that the user manually enters for the verifier.
29
33
30
34
#### Level 3 : Cryptographic Based Authentication
@@ -34,7 +38,9 @@ NIST 800-63b Authentication Assurance Level 3 (AAL3) is required when the impact
34
38
### Session Management: client- vs server-side sessions
35
39
36
40
HTTP on its own is a session-less protocol: no data is shared between requests. When you look at how we are using the web, this is clearly not what is user-visible as for example you log into a website and stay logged in during subsequent requests. This is possible as session-management has been implemented on top of HTTP.
41
+
37
42
Once the initial successful user authentication has taken place, an application may choose to track and maintain this authentication state for a limited amount of time. This will allow the user to continue using the application without having to keep re-authentication with each request. Tracking of this user state is called Session Management.
43
+
38
44
Session-Management can be roughly categorized in client- and server-side session management. In the former, all session data is stored within the client and transmitted on each request to the server. The latter stores session-specific data on the server, e.g., in a database, and only transmits an identifier to the client. The client then submits only the session-identifier on each request and the server retrieves the session-data from the server-side storage.
39
45
40
46
From a security-perspective server-side sessions have multiple benefits:
@@ -68,6 +74,7 @@ Passwords should comply with the following requirements at the very least:
68
74
#### Implement Secure Password Recovery Mechanism
69
75
70
76
It is common for an application to have a mechanism for a user to gain access to their account in the event they forget their password. A good design workflow for a password recovery feature will use multi-factor authentication elements. For example, it may ask a security question - something they know, and then send a generated token to a device - something they own.
77
+
71
78
Please see the [Forgot_Password_Cheat_Sheet](https://www.owasp.org/index.php/Forgot_Password_Cheat_Sheet) and [Choosing_and_Using_Security_Questions_Cheat_Sheet](https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet) for further details.
72
79
73
80
#### Implement Secure Password Storage
@@ -81,6 +88,7 @@ Typically server-side session management is implemented with HTTP cookies which
81
88
#### Session Generation and Expiration
82
89
83
90
User state is tracked in a session. This session is typically stored on the server for traditional web based session management. A session identifier is then given to the user so the user can identify which server-side session contains the correct user data. The client only needs to maintain this session identifier, which also keeps sensitive server-side session data off of the client.
91
+
84
92
Here are a few controls to consider when building or implementing session management solutions:
85
93
86
94
- Ensure that the session id is long, unique and random, i.e., is of high entropy.
@@ -92,12 +100,15 @@ Please see the [Session Management Cheat Sheet](https://www.owasp.org/index.php/
92
100
### Client-Side Session-Management
93
101
94
102
Server-side sessions can be limiting for some forms of authentication. "Stateless services" allow for client side management of session data for performance purposes so the server has less of a burden to store user sessions.
103
+
95
104
These "stateless" applications typically generate a short-lived access token containing all of the current user’s access permissions which is then included in all subsequent requests. Cryptography must be employed so that the client cannot alter the permissions stored within the token. When a client requests a server operation, the client includes the retrieved access token and the server verifies that the token has not been tampered with and extracts the permissions from the token. These permissions are then used for subsequent permission checks.
96
105
97
106
#### JWT (JSON Web Tokens)
98
107
99
108
JSON Web Token (JWT) is an open standard ([RFC 7519](https://tools.ietf.org/html/rfc7519)) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted as long as it is digitally signed by a trusted authority. A JWT token is created during authentication and is verified by the server (or servers) before any processing. However, JWTs are often not saved by the server after initial creation. JWTs are typically created and then handed to a client without being saved by the server in any way. The integrity of the token is maintained through the use of digital signatures so a server can later verify that the JWT is still valid and was not tampered with since its creation.
109
+
100
110
This approach is both stateless and portable in the way that client and server technologies can be different yet still interact.
111
+
101
112
Please note, that if you are using JWTs you have to make sure that the returned JWT is actually using one of the signing algorithms that you are using. Otherwise, an attacker could try to create a JWT signed with the NULL algorithm, use a MAC-vs-Signature confusion attack, or provide a custom JWS key for signing. When you are issuing JWTs, make double-sure that you are using a secure private key for signing the JWTs: each output JWT gives an attacker all information needed to perform an offline cracking attack, so you should rotate keys frequently too.
Copy file name to clipboardexpand all lines: docs/the-top-10/c9-security-logging-and-monitoring.md
+6-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,11 @@
2
2
3
3
## Description
4
4
5
-
Logging is a concept that most developers already use for debugging and diagnostic purposes. Security logging is an equally basic concept: to log security information during the runtime operation of an application. Monitoring is the live review of application and security logs using various forms of automation. The same tools and patterns can be used for operations, debugging and security purposes.
5
+
Logging is a concept that most developers already use for debugging and diagnostic purposes. Security logging is an equally basic concept: to log security information during the runtime operation of an application.
6
+
7
+
Monitoring is the live review of application and security logs using various forms of automation. The same tools and patterns can be used for operations, debugging and security purposes.
8
+
9
+
The goal of secruity logging is to detect and respond to potential security incidents.
6
10
7
11
### Benefits of Security Logging
8
12
@@ -20,6 +24,7 @@ Use logging to identify activity that indicates that a user is behaving maliciou
20
24
- Submitted data that involves changes to data that should not be modifiable (select list, checkbox or other limited entry component).
21
25
- Requests that violate server-side access control rules.
22
26
- A more comprehensive list of possible detection points is available [here](https://cheatsheetseries.owasp.org/cheatsheets/Application_Logging_Vocabulary_Cheat_Sheet.html).
27
+
23
28
When your application encounters such activity, your application should at the very least log the activity and mark it as a high severity issue. Ideally, your application should also respond to a possible identified attack, by for example invalidating the user’s session and locking the user’s account. The response mechanisms allow the software to react in realtime to possible identified attacks.
0 commit comments