This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Guide Table of Contents"
Weilin Zhong (talk | contribs) (→#Frontispiece) |
Weilin Zhong (talk | contribs) |
||
| Line 1: | Line 1: | ||
| − | + | [[Guide Frontispiece|Frontispiece]] | |
| − | + | ||
| − | + | == Dedication | |
| − | + | ||
| − | + | == Copyright and license | |
| − | + | ||
| − | + | == Editors | |
| − | + | ||
| − | + | == Authors and Reviewers | |
| − | + | ||
| − | + | == Revision History | |
| − | + | ||
| − | + | =[[About The Open Web Application Security Project]] | |
| − | + | ||
| − | + | ==Structure and Licensing | |
| − | + | ||
| − | + | ==Participation and Membership | |
| − | + | ||
| − | + | ==Projects | |
| − | + | ||
| − | + | =[[Guide Introduction | Introduction]] | |
| − | + | ||
| − | + | ==Developing Secure Applications | |
| − | + | ||
| − | + | ==Improvements in this edition | |
| − | + | ||
| − | + | ==How to use this Guide | |
| − | + | ||
| − | + | ==Updates and errata | |
| − | + | ||
| − | + | ==With thanks | |
| − | + | ||
| − | + | =[[What are web applications?]] | |
| − | + | ||
| − | + | ==Technologies | |
| − | + | ||
| − | + | ==First generation – CGI | |
| − | + | ||
| − | + | ==Filters | |
| − | + | ||
| − | + | ==Scripting | |
| − | + | ||
| − | + | ==Web application frameworks – J | |
| − | + | ||
| − | + | ==Small to medium scale applications | |
| − | + | ||
| − | + | ==Large scale applications | |
| − | + | ||
| − | + | ==View | |
| − | + | ||
| − | + | ==Controller | |
| − | + | ||
| − | + | ==Model | |
| − | + | ||
| − | + | ==Conclusion | |
| − | + | ||
| − | + | =[[Policy Frameworks]] | |
| − | + | ||
| − | + | ==Organizational commitment to security | |
| − | + | ||
| − | + | ==OWASP’s Place at the Framework table | |
| − | + | ||
| − | + | ==Development Methodology | |
| − | + | ||
| − | + | ==Coding Standards | |
| − | + | ||
| − | + | ==Source Code Control | |
| − | + | ||
| − | + | ==Summary | |
| − | + | ||
| − | + | =[[Secure Coding Principles]] | |
| − | + | ||
| − | + | ==Asset Classification | |
| − | + | ||
| − | + | ==About attackers | |
| − | + | ||
| − | + | ==Core pillars of information security | |
| − | + | ||
| − | + | ==Security Architecture | |
| − | + | ||
| − | + | ==Security Principles | |
| − | + | ||
| − | + | =[[Threat Risk Modeling]] | |
| − | + | ||
| − | + | ==Threat Risk Modeling | |
| − | + | ||
| − | + | ==Performing threat risk modeling using the Microsoft Threat Modeling Process | |
| − | + | ||
| − | + | ==Alternative Threat Modeling Systems | |
| − | + | ||
| − | + | ==Trike | |
| − | + | ||
| − | + | ==AS/NZS | |
| − | + | ||
| − | + | ==CVSS | |
| − | + | ||
| − | + | ==OCTAVE | |
| − | + | ||
| − | + | ==Conclusion | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | =[[Handling E-Commerce Payments]] | |
| − | + | ||
| − | + | ==Objectives | |
| − | + | ||
| − | + | ==Compliance and Laws | |
| − | + | ||
| − | + | ==PCI Compliance | |
| − | + | ||
| − | + | ==Handling Credit Cards | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | =[[Phishing]] | |
| − | + | ||
| − | + | ==What is phishing? | |
| − | + | ||
| − | + | ==User Education | |
| − | + | ||
| − | + | ==Make it easy for your users to report scams | |
| − | + | ||
| − | + | ==Communicating with customers via e-mail | |
| − | + | ||
| − | + | ==Never ask your customers for their secrets | |
| − | + | ||
| − | + | ==Fix all your XSS issues | |
| − | + | ||
| − | + | ==Do not use pop-ups | |
| − | + | ||
| − | + | ==Don’t be framed | |
| − | + | ||
| − | + | ==Move your application one link away from your front page | |
| − | + | ||
| − | + | ==Enforce local referrers for images and other resources | |
| − | + | ||
| − | + | ==Keep the address bar, use SSL, do not use IP addresses | |
| − | + | ||
| − | + | ==Don’t be the source of identity theft | |
| − | + | ||
| − | + | ==Implement safe-guards within your application | |
| − | + | ||
| − | + | ==Monitor unusual account activity | |
| − | + | ||
| − | + | ==Get the phishing target servers offline pronto | |
| − | + | ||
| − | + | ==Take control of the fraudulent domain name | |
| − | + | ||
| − | + | ==Work with law enforcement | |
| − | + | ||
| − | + | ==When an attack happens | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | =[[Web Services]] | |
| − | + | ||
| − | + | ==Securing Web Services | |
| − | + | ||
| − | + | ==Communication security | |
| − | + | ||
| − | + | ==Passing credentials | |
| − | + | ||
| − | + | ==Ensuring message freshness | |
| − | + | ||
| − | + | ==Protecting message integrity | |
| − | + | ||
| − | + | ==Protecting message confidentiality | |
| − | + | ||
| − | + | ==Access control | |
| − | + | ||
| − | + | ==Audit | |
| − | + | ||
| − | + | ==Web Services Security Hierarchy | |
| − | + | ||
| − | + | ==SOAP | |
| − | + | ||
| − | + | ==WS-Security Standard | |
| − | + | ||
| − | + | ==WS-Security Building Blocks | |
| − | + | ||
| − | + | ==Communication Protection Mechanisms | |
| − | + | ||
| − | + | ==Access Control Mechanisms | |
| − | + | ||
| − | + | ==Forming Web Service Chains | |
| − | + | ||
| − | + | ==Available Implementations | |
| − | + | ||
| − | + | ==Problems | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | =[[Ajax and Other "Rich" Interface Technologies]] | |
| − | + | ||
| − | + | ==Objective | |
| − | + | ||
| − | + | ==Platforms Affected | |
| − | + | ||
| − | + | ==Architecture | |
| − | + | ||
| − | + | ==Access control: Authentication and Authorization | |
| − | + | ||
| − | + | ==Silent transactional authorization | |
| − | + | ||
| − | + | ==Untrusted or absent session data | |
| − | + | ||
| − | + | ==State management | |
| − | + | ||
| − | + | ==Tamper resistance | |
| − | + | ||
| − | + | ==Privacy | |
| − | + | ||
| − | + | ==Proxy Façade | |
| − | + | ||
| − | + | ==SOAP Injection Attacks | |
| − | + | ||
| − | + | ==XMLRPC Injection Attacks | |
| − | + | ||
| − | + | ==DOM Injection Attacks | |
| − | + | ||
| − | + | ==XML Injection Attacks | |
| − | + | ||
| − | + | ==JSON (Javascript Object Notation) Injection Attacks | |
| − | + | ||
| − | + | ==Encoding safety | |
| − | + | ||
| − | + | ==Auditing | |
| − | + | ||
| − | + | ==Error Handling | |
| − | + | ||
| − | + | ==Accessibility | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | =[[Authentication]] | |
| − | + | ||
| − | + | ==Objective | |
| − | + | ||
| − | + | ==Environments Affected | |
| − | + | ||
| − | + | ==Relevant COBIT Topics | |
| − | + | ||
| − | + | ==Best Practices | |
| − | + | ||
| − | + | ==Common web authentication techniques | |
| − | + | ||
| − | + | ==Strong Authentication | |
| − | + | ||
| − | + | ==Federated Authentication | |
| − | + | ||
| − | + | ==Client side authentication controls | |
| − | + | ||
| − | + | ==Positive Authentication | |
| − | + | ||
| − | + | ==Multiple Key Lookups | |
| − | + | ||
| − | + | ==Referer Checks | |
| − | + | ||
| − | + | ==Browser remembers passwords | |
| − | + | ||
| − | + | ==Default accounts | |
| − | + | ||
| − | + | ==Choice of usernames | |
| − | + | ||
| − | + | ==Change passwords | |
| − | + | ||
| − | + | ==Short passwords | |
| − | + | ||
| − | + | ==Weak password controls | |
| − | + | ||
| − | + | ==Reversible password encryption | |
| − | + | ||
| − | + | ==Automated password resets | |
| − | + | ||
| − | + | ==Brute Force | |
| − | + | ||
| − | + | ==Remember Me | |
| − | + | ||
| − | + | ==Idle Timeouts | |
| − | + | ||
| − | + | ==Logout | |
| − | + | ||
| − | + | ==Account Expiry | |
| − | + | ||
| − | + | ==Self registration | |
| − | + | ||
| − | + | ==CAPTCHA | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | ==Authentication | |
| − | + | ||
| − | + | =[[Authorization]] | |
| − | + | ||
| − | + | ==Objectives | |
| − | + | ||
| − | + | ==Environments Affected | |
| − | + | ||
| − | + | ==Relevant COBIT Topics | |
| − | + | ||
| − | + | ==Best Practices | |
| − | + | ||
| − | + | ==Best Practices in Action | |
| − | + | ||
| − | + | ==Principle of least privilege | |
| − | + | ||
| − | + | ==Centralized authorization routines | |
| − | + | ||
| − | + | ==Authorization matrix | |
| − | + | ||
| − | + | ==Controlling access to protected resources | |
| − | + | ||
| − | + | ==Protecting access to static resources | |
| − | + | ||
| − | + | ==Reauthorization for high value activities or after idle out | |
| − | + | ||
| − | + | ==Time based authorization | |
| − | + | ||
| − | + | ==Be cautious of custom authorization controls | |
| − | + | ||
| − | + | ==Never implement client-side authorization tokens | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | =[[Session Management]] | |
| − | + | ||
| − | + | ==Objective | |
| − | + | ||
| − | + | ==Environments Affected | |
| − | + | ||
| − | + | ==Relevant COBIT Topics | |
| − | + | ||
| − | + | ==Description | |
| − | + | ||
| − | + | ==Best practices | |
| − | + | ||
| − | + | ==Exposed Session Variables | |
| − | + | ||
| − | + | ==Page and Form Tokens | |
| − | + | ||
| − | + | ==Weak Session Cryptographic Algorithms | |
| − | + | ||
| − | + | ==Session Token Entropy | |
| − | + | ||
| − | + | ==Session Time-out | |
| − | + | ||
| − | + | ==Regeneration of Session Tokens | |
| − | + | ||
| − | + | ==Session Forging/Brute-Forcing Detection and/or Lockout | |
| − | + | ||
| − | + | ==Session Token Capture and Session Hijacking | |
| − | + | ||
| − | + | ==Session Tokens on Logout | |
| − | + | ||
| − | + | ==Session Validation Attacks | |
| − | + | ||
| − | + | ==PHP | |
| − | + | ||
| − | + | ==Sessions | |
| − | + | ||
| − | + | ==Further Reading | |
| − | + | ||
| − | + | ==Session Management | |
| − | + | ||
| − | + | =[[Data Validation]] | |
| − | + | ||
| − | + | ==Objective | |
| − | + | ||
| − | + | ==Platforms Affected | |
| − | + | ||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Description | ||
| + | |||
| + | ==Definitions | ||
| + | |||
| + | ==Where to include integrity checks | ||
| + | |||
| + | ==Where to include validation | ||
| + | |||
| + | ==Where to include business rule validation | ||
| + | |||
| + | ==Data Validation Strategies | ||
| + | |||
| + | ==Prevent parameter tampering | ||
| + | |||
| + | ==Hidden fields | ||
| + | |||
| + | ==ASP.NET Viewstate | ||
| + | |||
| + | ==URL encoding | ||
| + | |||
| + | ==HTML encoding | ||
| + | |||
| + | ==Encoded strings | ||
| + | |||
| + | ==Data Validation and Interpreter Injection | ||
| + | |||
| + | ==Delimiter and special characters | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | =[[Interpreter Injection]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==User Agent Injection | ||
| + | |||
| + | ==HTTP Response Splitting | ||
| + | |||
| + | ==SQL Injection | ||
| + | |||
| + | ==ORM Injection | ||
| + | |||
| + | ==LDAP Injection | ||
| + | |||
| + | ==XML Injection | ||
| + | |||
| + | ==Code Injection | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | ==SQL-injection | ||
| + | |||
| + | ==Code Injection | ||
| + | |||
| + | ==Command injection | ||
| + | |||
| + | =[[Canoncalization, locale and Unicode]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Description | ||
| + | |||
| + | ==Unicode | ||
| + | |||
| + | ==http://www.ietf.org/rfc/rfc== | ||
| + | |||
| + | ==Input Formats | ||
| + | |||
| + | ==Locale assertion | ||
| + | |||
| + | ==Double (or n-) encoding | ||
| + | |||
| + | == HTTP Request Smuggling | ||
| + | |||
| + | == Further Reading | ||
| + | |||
| + | =[[Error Handling, Auditing and Logging]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Environments Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Description | ||
| + | |||
| + | ==Best practices | ||
| + | |||
| + | ==Error Handling | ||
| + | |||
| + | ==Detailed error messages | ||
| + | |||
| + | ==Logging | ||
| + | |||
| + | ==Noise | ||
| + | |||
| + | ==Cover Tracks | ||
| + | |||
| + | ==False Alarms | ||
| + | |||
| + | ==Destruction | ||
| + | |||
| + | ==Audit Trails | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | ==Error Handling and Logging | ||
| + | |||
| + | =[[File System]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Environments Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Description | ||
| + | |||
| + | ==Best Practices | ||
| + | |||
| + | ==Defacement | ||
| + | |||
| + | ==Path traversal | ||
| + | |||
| + | ==Insecure permissions | ||
| + | |||
| + | ==Insecure Indexing | ||
| + | |||
| + | ==Unmapped files | ||
| + | |||
| + | ==Temporary files | ||
| + | |||
| + | ==PHP | ||
| + | |||
| + | ==Includes and Remote files | ||
| + | |||
| + | ==File upload | ||
| + | |||
| + | ==Old, unreferenced files | ||
| + | |||
| + | ==Second Order Injection | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | ==File System | ||
| + | |||
| + | =[[Distributed Computing]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Environments Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Best Practices | ||
| + | |||
| + | ==Race conditions | ||
| + | |||
| + | ==Distributed synchronization | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | =[[Buffer Overflows]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Description | ||
| + | |||
| + | ==General Prevention Techniques | ||
| + | |||
| + | ==Stack Overflow | ||
| + | |||
| + | ==Heap Overflow | ||
| + | |||
| + | ==Format String | ||
| + | |||
| + | ==Unicode Overflow | ||
| + | |||
| + | ==Integer Overflow | ||
| + | |||
| + | ==Further reading | ||
| + | |||
| + | =[[Administrative Interface]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Environments Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Best practices | ||
| + | |||
| + | ==Administrators are not users | ||
| + | |||
| + | ==Authentication for high value systems | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | =[[Cryptography]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Description | ||
| + | |||
| + | ==Cryptographic Functions | ||
| + | |||
| + | ==Cryptographic Algorithms | ||
| + | |||
| + | ==Algorithm Selection | ||
| + | |||
| + | ==Key Storage | ||
| + | |||
| + | ==Insecure transmission of secrets | ||
| + | |||
| + | ==Reversible Authentication Tokens | ||
| + | |||
| + | ==Safe UUID generation | ||
| + | |||
| + | ==Summary | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | ==Cryptography | ||
| + | |||
| + | =[[Configuration]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Best Practices | ||
| + | |||
| + | ==Default passwords | ||
| + | |||
| + | ==Secure connection strings | ||
| + | |||
| + | ==Secure network transmission | ||
| + | |||
| + | ==Encrypted data | ||
| + | |||
| + | ==PHP Configuration | ||
| + | |||
| + | ==Global variables | ||
| + | |||
| + | ==register_globals | ||
| + | |||
| + | ==Database security | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | ==ColdFusion Components (CFCs) | ||
| + | |||
| + | ==Configuration | ||
| + | |||
| + | =[[Software Quality Assurance]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Best practices | ||
| + | |||
| + | ==Process | ||
| + | |||
| + | ==Metrics | ||
| + | |||
| + | ==Testing Activities | ||
| + | |||
| + | =[[Deployment]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Best Practices | ||
| + | |||
| + | ==Release Management | ||
| + | |||
| + | ==Secure delivery of code | ||
| + | |||
| + | ==Code signing | ||
| + | |||
| + | ==Permissions are set to least privilege | ||
| + | |||
| + | ==Automated packaging | ||
| + | |||
| + | ==Automated deployment | ||
| + | |||
| + | ==Automated removal | ||
| + | |||
| + | ==No backup or old files | ||
| + | |||
| + | ==Unnecessary features are off by default | ||
| + | |||
| + | ==Setup log files are clean | ||
| + | |||
| + | ==No default accounts | ||
| + | |||
| + | ==Easter eggs | ||
| + | |||
| + | ==Malicious software | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | =[[Maintenance]] | ||
| + | |||
| + | ==Objective | ||
| + | |||
| + | ==Platforms Affected | ||
| + | |||
| + | ==Relevant COBIT Topics | ||
| + | |||
| + | ==Best Practices | ||
| + | |||
| + | ==Security Incident Response | ||
| + | |||
| + | ==Fix Security Issues Correctly | ||
| + | |||
| + | ==Update Notifications | ||
| + | |||
| + | ==Regularly check permissions | ||
| + | |||
| + | ==Further Reading | ||
| + | |||
| + | ==Maintenance | ||
| + | |||
| + | =[[GNU Free Documentation License]] | ||
| + | |||
| + | ==PREAMBLE | ||
| + | |||
| + | ==APPLICABILITY AND DEFINITIONS | ||
| + | |||
| + | ==VERBATIM COPYING | ||
| + | |||
| + | ==COPYING IN QUANTITY | ||
| + | |||
| + | ==MODIFICATIONS | ||
| + | |||
| + | ==COMBINING DOCUMENTS | ||
| + | |||
| + | ==COLLECTIONS OF DOCUMENTS | ||
| + | |||
| + | ==AGGREGATION WITH INDEPENDENT WORKS | ||
| + | |||
| + | ==TRANSLATION | ||
| + | |||
| + | ==TERMINATION | ||
| + | |||
| + | ==FUTURE REVISIONS OF THIS LICENSE | ||
Revision as of 12:40, 22 May 2006
== Dedication
== Copyright and license
== Editors
== Authors and Reviewers
== Revision History
=About The Open Web Application Security Project
==Structure and Licensing
==Participation and Membership
==Projects
==Developing Secure Applications
==Improvements in this edition
==How to use this Guide
==Updates and errata
==With thanks
==Technologies
==First generation – CGI
==Filters
==Scripting
==Web application frameworks – J
==Small to medium scale applications
==Large scale applications
==View
==Controller
==Model
==Conclusion
==Organizational commitment to security
==OWASP’s Place at the Framework table
==Development Methodology
==Coding Standards
==Source Code Control
==Summary
==Asset Classification
==About attackers
==Core pillars of information security
==Security Architecture
==Security Principles
==Threat Risk Modeling
==Performing threat risk modeling using the Microsoft Threat Modeling Process
==Alternative Threat Modeling Systems
==Trike
==AS/NZS
==CVSS
==OCTAVE
==Conclusion
==Further Reading
==Objectives
==Compliance and Laws
==PCI Compliance
==Handling Credit Cards
==Further Reading
==What is phishing?
==User Education
==Make it easy for your users to report scams
==Communicating with customers via e-mail
==Never ask your customers for their secrets
==Fix all your XSS issues
==Do not use pop-ups
==Don’t be framed
==Move your application one link away from your front page
==Enforce local referrers for images and other resources
==Keep the address bar, use SSL, do not use IP addresses
==Don’t be the source of identity theft
==Implement safe-guards within your application
==Monitor unusual account activity
==Get the phishing target servers offline pronto
==Take control of the fraudulent domain name
==Work with law enforcement
==When an attack happens
==Further Reading
==Securing Web Services
==Communication security
==Passing credentials
==Ensuring message freshness
==Protecting message integrity
==Protecting message confidentiality
==Access control
==Audit
==Web Services Security Hierarchy
==SOAP
==WS-Security Standard
==WS-Security Building Blocks
==Communication Protection Mechanisms
==Access Control Mechanisms
==Forming Web Service Chains
==Available Implementations
==Problems
==Further Reading
=Ajax and Other "Rich" Interface Technologies
==Objective
==Platforms Affected
==Architecture
==Access control: Authentication and Authorization
==Silent transactional authorization
==Untrusted or absent session data
==State management
==Tamper resistance
==Privacy
==Proxy Façade
==SOAP Injection Attacks
==XMLRPC Injection Attacks
==DOM Injection Attacks
==XML Injection Attacks
==JSON (Javascript Object Notation) Injection Attacks
==Encoding safety
==Auditing
==Error Handling
==Accessibility
==Further Reading
==Objective
==Environments Affected
==Relevant COBIT Topics
==Best Practices
==Common web authentication techniques
==Strong Authentication
==Federated Authentication
==Client side authentication controls
==Positive Authentication
==Multiple Key Lookups
==Referer Checks
==Browser remembers passwords
==Default accounts
==Choice of usernames
==Change passwords
==Short passwords
==Weak password controls
==Reversible password encryption
==Automated password resets
==Brute Force
==Remember Me
==Idle Timeouts
==Logout
==Account Expiry
==Self registration
==CAPTCHA
==Further Reading
==Authentication
==Objectives
==Environments Affected
==Relevant COBIT Topics
==Best Practices
==Best Practices in Action
==Principle of least privilege
==Centralized authorization routines
==Authorization matrix
==Controlling access to protected resources
==Protecting access to static resources
==Reauthorization for high value activities or after idle out
==Time based authorization
==Be cautious of custom authorization controls
==Never implement client-side authorization tokens
==Further Reading
==Objective
==Environments Affected
==Relevant COBIT Topics
==Description
==Best practices
==Exposed Session Variables
==Page and Form Tokens
==Weak Session Cryptographic Algorithms
==Session Token Entropy
==Session Time-out
==Regeneration of Session Tokens
==Session Forging/Brute-Forcing Detection and/or Lockout
==Session Token Capture and Session Hijacking
==Session Tokens on Logout
==Session Validation Attacks
==PHP
==Sessions
==Further Reading
==Session Management
==Objective
==Platforms Affected
==Relevant COBIT Topics
==Description
==Definitions
==Where to include integrity checks
==Where to include validation
==Where to include business rule validation
==Data Validation Strategies
==Prevent parameter tampering
==Hidden fields
==ASP.NET Viewstate
==URL encoding
==HTML encoding
==Encoded strings
==Data Validation and Interpreter Injection
==Delimiter and special characters
==Further Reading
==Objective
==Platforms Affected
==Relevant COBIT Topics
==User Agent Injection
==HTTP Response Splitting
==SQL Injection
==ORM Injection
==LDAP Injection
==XML Injection
==Code Injection
==Further Reading
==SQL-injection
==Code Injection
==Command injection
=Canoncalization, locale and Unicode
==Objective
==Platforms Affected
==Relevant COBIT Topics
==Description
==Unicode
http://www.ietf.org/rfc/rfc
==Input Formats
==Locale assertion
==Double (or n-) encoding
== HTTP Request Smuggling
== Further Reading
=Error Handling, Auditing and Logging
==Objective
==Environments Affected
==Relevant COBIT Topics
==Description
==Best practices
==Error Handling
==Detailed error messages
==Logging
==Noise
==Cover Tracks
==False Alarms
==Destruction
==Audit Trails
==Further Reading
==Error Handling and Logging
==Objective
==Environments Affected
==Relevant COBIT Topics
==Description
==Best Practices
==Defacement
==Path traversal
==Insecure permissions
==Insecure Indexing
==Unmapped files
==Temporary files
==PHP
==Includes and Remote files
==File upload
==Old, unreferenced files
==Second Order Injection
==Further Reading
==File System
==Objective
==Environments Affected
==Relevant COBIT Topics
==Best Practices
==Race conditions
==Distributed synchronization
==Further Reading
==Objective
==Platforms Affected
==Relevant COBIT Topics
==Description
==General Prevention Techniques
==Stack Overflow
==Heap Overflow
==Format String
==Unicode Overflow
==Integer Overflow
==Further reading
==Objective
==Environments Affected
==Relevant COBIT Topics
==Best practices
==Administrators are not users
==Authentication for high value systems
==Further Reading
==Objective
==Platforms Affected
==Relevant COBIT Topics
==Description
==Cryptographic Functions
==Cryptographic Algorithms
==Algorithm Selection
==Key Storage
==Insecure transmission of secrets
==Reversible Authentication Tokens
==Safe UUID generation
==Summary
==Further Reading
==Cryptography
==Objective
==Platforms Affected
==Relevant COBIT Topics
==Best Practices
==Default passwords
==Secure connection strings
==Secure network transmission
==Encrypted data
==PHP Configuration
==Global variables
==register_globals
==Database security
==Further Reading
==ColdFusion Components (CFCs)
==Configuration
==Objective
==Platforms Affected
==Best practices
==Process
==Metrics
==Testing Activities
==Objective
==Platforms Affected
==Best Practices
==Release Management
==Secure delivery of code
==Code signing
==Permissions are set to least privilege
==Automated packaging
==Automated deployment
==Automated removal
==No backup or old files
==Unnecessary features are off by default
==Setup log files are clean
==No default accounts
==Easter eggs
==Malicious software
==Further Reading
==Objective
==Platforms Affected
==Relevant COBIT Topics
==Best Practices
==Security Incident Response
==Fix Security Issues Correctly
==Update Notifications
==Regularly check permissions
==Further Reading
==Maintenance
=GNU Free Documentation License
==PREAMBLE
==APPLICABILITY AND DEFINITIONS
==VERBATIM COPYING
==COPYING IN QUANTITY
==MODIFICATIONS
==COMBINING DOCUMENTS
==COLLECTIONS OF DOCUMENTS
==AGGREGATION WITH INDEPENDENT WORKS
==TRANSLATION
==TERMINATION
==FUTURE REVISIONS OF THIS LICENSE