filmov
tv
Instant Threat Modeling - #19 API Security

Показать описание
Threats:
- API1:2019 Broken Object Level Authorization
- API2:2019 Broken User Authentication
- API3:2019 Excessive Data Exposure
- API4:2019 Lack of Resources & Rate Limiting
- API5:2019 Broken Function Level Authorization
- API6:2019 Mass Assignment
- API7:2019 Security Misconfiguration
- API8:2019 Injection
- API9:2019 Improper Assets Management
- API10:2019 Insufficient Logging & Monitoring
Instant mitigations:
- Centralised authorization mechanism - OWASP Access Control Cheatsheet
- OWASP Authentication Cheatsheet and Session Management Cheatsheet
- Verify the API response against the UI design, don't serialize the objects.
- Introduce lockout mechanism, rate limiting - OWASP Blocking Brute Force Attacks doc
- OWASP Top 10 2013 A7 - Missing Function Level Access Control - make sure before running each method that the user is allowed to execute it.
- Verify the server-side backend code against the API design - OWASP Mass Assignemnt Cheatsheet
- A base threat model for the corresponding components - web or mobile front-end, back-end frameworks and operating systems
- OWASP Injection Prevention Cheatsheet - validate all input against specific format. Cast input to a pre-defined types with prototype validators.
- Introduce asset inventory - servers, environments, API deployments and their versions - list of all endpoints
- OWASP logging cheatsheet and C9 in the OWASP Proactive Control doc.
Instant Threat Modeling by Jakub Kaluzny (SecuRing).
Комментарии