OWASP Top 10 Security Vulnerabilities Flashcards
How do you mitigate against Broken Access Control?
Limit visitor access to only authorised pages or sections.
Principle of least privilege.
How do you mitigate against Cryptographic Failures?
Use secure cryptographic practices to protect data in transit and at rest.
Strong hash algorithms and neverwriteown encyption
How do you mitigate against Injection Attacks?
Parameterised SQL commands for all data coming from user.
Enums, TryParse, lookup values
How do you mitigate against Insecure Design?
Threat modelling, secure design patterns and reference architectures.
How do you mitigate against Security Misconfiguration?
Proper security hardening and config of components. Review and update properly.
How do you mitigate against Vulnerable and Outdated Components?
Keep frameworks up-to-date with Nuget and avoid those with security issues.
How do you mitigate against Identification and Authentication Failures?
Ensure proper identification and authentication measures.
How do you mitigate against Software and Data Integrity Failures?
Ensure integrity of software and data.
How do you mitigate against Security Logging and Monitoring Failures?
Ensure proper logging and monitoring of security events.
How do you mitigate against Server-side Request Forgery (SSRF)?
Prevent unauthorised server-side requests by IP or application whitelisting