Skip to content

Commit c3faaf0

Browse files
committed
Updating notes
1 parent 59597b4 commit c3faaf0

File tree

1 file changed

+44
-1
lines changed

1 file changed

+44
-1
lines changed

content/websites/security.md

+44-1
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,47 @@ tags: ["websites", "security"]
1717

1818
## Auditing
1919

20-
- [Lynis](https://cisofy.com/lynis/) - A security auditing tool
20+
- [Lynis](https://cisofy.com/lynis/) - A security auditing tool
21+
22+
## AJAX
23+
24+
### Don't
25+
26+
- Rely on client logic for security
27+
- Build JSON dynamically
28+
- Transmit secrets to the client
29+
- Perform encryption on the client-side code
30+
- Write your own serialization code (use `JSON` library)
31+
32+
### Do
33+
34+
- Keep business logic on the server
35+
- Server - use CSRF tokens
36+
- ALWAYS return JSON with an Object on the outside `{"object": "good code"}`
37+
38+
## Abuse Cases
39+
40+
Full [details here](https://cheatsheetseries.owasp.org/cheatsheets/Abuse_Case_Cheat_Sheet.html).
41+
42+
Create a speadsheet with the following tabs:
43+
44+
### Features
45+
46+
| Feature unique ID | Feature name | Feature short description |
47+
| ----------------- | --------------------- | --------------------------------------------- |
48+
| FEATURE_001 | DocumentUploadFeature | Allow user to upload document along a message |
49+
50+
### Counter Measures
51+
52+
| Countermeasure unique ID | Countermeasure short description | Countermeasure help/hint |
53+
| ------------------------ | ------------------------------------------------------ | ------------------------------------------------------- |
54+
| DEFENSE_001 | Validate the uploaded file by loading it into a parser | Use advice from the OWASP Cheat Sheet about file upload |
55+
56+
### Abuse Cases
57+
58+
| Abuse case unique ID | Feature ID impacted | Abuse case's attack description | Attack referential ID (if applicable) | CVSS V3 risk rating (score) | CVSS V3 string | Kind of abuse case | Countermeasure ID applicable | Handling decision (To Address or Risk Accepted) |
59+
| -------------------- | ------------------- | ----------------------------------------------------------------------- | ------------------------------------- | --------------------------- | -------------------------------------------- | ------------------ | ---------------------------- | ----------------------------------------------- |
60+
| ABUSE_CASE_001 | FEATURE_001 | Upload Office file with malicious macro in charge of dropping a malware | CAPEC-17 | HIGH (7.7) | CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:H | Technical | DEFENSE_001 | To Address |
61+
62+
## Access Control
63+

0 commit comments

Comments
 (0)