This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Access control"
m |
|||
Line 4: | Line 4: | ||
{{Stub}} | {{Stub}} | ||
+ | {{Template:Control}} | ||
+ | |||
+ | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
+ | |||
+ | ==Description== | ||
+ | |||
+ | A control (countermeasure or security control) is a protection mechanism that prevents, deters, or detects attacks, or prevents or reduces vulnerabilities. | ||
+ | |||
+ | # Start with a one-sentence description of the control | ||
+ | # How does the countermeasure work? | ||
+ | # What are some examples of implementations of the control (steer clear of specific products) | ||
+ | |||
+ | |||
+ | ==Risk Factors== | ||
+ | |||
+ | * Talk about the [[OWASP Risk Rating Methodology|factors]] that this control affects | ||
+ | * What effect does this countermeasure have on the attack or vulnerability? | ||
+ | * Does this control reduce the technical or business impact? | ||
+ | |||
+ | |||
+ | ==Difficulty to Implement== | ||
+ | |||
+ | * Discuss the typical difficulty of implementing this control, emphasizing the factors that make it easier or harder | ||
+ | * Steer clear of language/platform specific information here | ||
+ | |||
+ | |||
+ | ==Examples== | ||
+ | |||
+ | ===Short example name=== | ||
+ | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
+ | |||
+ | ===Short example name=== | ||
+ | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
+ | |||
+ | |||
+ | ==Related [[Attacks]]== | ||
+ | |||
+ | * [[Attack 1]] | ||
+ | * [[Attack 2]] | ||
+ | |||
+ | |||
+ | ==Related [[Vulnerabilities]]== | ||
+ | |||
+ | * [[Vulnerability 1]] | ||
+ | * [[Vulnerabiltiy 2]] | ||
+ | |||
+ | Note: the contents of "Related Problems" sections should be placed here | ||
+ | |||
+ | |||
+ | ==Related [[Controls]]== | ||
+ | |||
+ | * [[Control 1]] | ||
+ | * [[Control 2]] | ||
+ | |||
+ | Note: contents of "Avoidance and Mitigation" and "Countermeasure" related Sections should be placed here | ||
+ | |||
+ | ==References== | ||
+ | |||
+ | * http://www.link1.com | ||
+ | * [http://www.link2.com Title for the link2] | ||
+ | |||
+ | |||
+ | In addition, one should classify control based on the following subcategories: Ex:<nowiki>[[Category:Error Handling Control]]</nowiki> | ||
+ | |||
+ | Availability Control | ||
+ | |||
+ | Authorization Control | ||
+ | |||
+ | Authentication Control | ||
+ | |||
+ | Concurrency Control | ||
+ | |||
+ | Configuration Control | ||
+ | |||
+ | Cryptographic Control | ||
+ | |||
+ | Encoding Control | ||
+ | |||
+ | Error Handling Control | ||
+ | |||
+ | Input Validation Control | ||
+ | |||
+ | Logging and Auditing Control | ||
+ | |||
+ | Session Management Control | ||
+ | |||
+ | __NOTOC__ |
Revision as of 11:31, 20 September 2008
This is a control. To view all control, please see the Control Category page.
Check Broken Access Control for contents.
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a control. To view all control, please see the Control Category page.
Last revision (mm/dd/yy): 09/20/2008
Description
A control (countermeasure or security control) is a protection mechanism that prevents, deters, or detects attacks, or prevents or reduces vulnerabilities.
- Start with a one-sentence description of the control
- How does the countermeasure work?
- What are some examples of implementations of the control (steer clear of specific products)
Risk Factors
- Talk about the factors that this control affects
- What effect does this countermeasure have on the attack or vulnerability?
- Does this control reduce the technical or business impact?
Difficulty to Implement
- Discuss the typical difficulty of implementing this control, emphasizing the factors that make it easier or harder
- Steer clear of language/platform specific information here
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Note: the contents of "Related Problems" sections should be placed here
Related Controls
Note: contents of "Avoidance and Mitigation" and "Countermeasure" related Sections should be placed here
References
In addition, one should classify control based on the following subcategories: Ex:[[Category:Error Handling Control]]
Availability Control
Authorization Control
Authentication Control
Concurrency Control
Configuration Control
Cryptographic Control
Encoding Control
Error Handling Control
Input Validation Control
Logging and Auditing Control
Session Management Control