This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Transport Layer Protection Cheat Sheet"

From OWASP
Jump to: navigation, search
m
m
Line 1: Line 1:
Page is under contruction - [email protected]<br>
+
Page is under contruction - [email protected]<br>  
  
 
= Introduction  =
 
= Introduction  =
Line 13: Line 13:
 
End Point Authentication  
 
End Point Authentication  
  
= Rules for Transport Layer Protection<br> =
+
= Rules for Transport Layer Protection<br> =
  
== Server Configuration<br> ==
+
== Secure Server Design <br> ==
  
=== Architecture &amp;&nbsp;Design ===
+
=== Rule #1 - Use SSL for All Login Pages and All Authenticated Pages<br>  ===
  
=== Rule #1 - Use SSL for All Login Pages and All Authenticated Pages<br> ===
+
=== Rule #2 - Use SSL on Any Networks (External and Internal) Transmiting Sensitive Data<br> ===
  
=== Rule #2 - Use SSL on Networks (External and Internal) Transmiting Sensitive Data<br> ===
+
=== Rule #3 - Do Not Provide Non-SSL Pages for Secure Content<br> ===
  
=== Rule #3 - Do Not Provide Non-SSL Pages for Secure Content<br> ===
+
=== Rule #4 - Do Not Perform Redirectsfrom Non-SSL Login to&nbsp;SSL&nbsp;Login Page  ===
  
=== Rule #4 - Do Not Perform Redirectsfrom Non-SSL Login to&nbsp;SSL&nbsp;Login Page ===
+
=== Rule #5 - Do Not Mix SSL and Non-SSL&nbsp;Content  ===
  
=== Rule #5 - Do Not Mix SSL and Non-SSL&nbsp;Content ===
+
== Server Certificate &amp;&nbsp;Protocol Configuration  ==
  
 +
=== Rule #6 - Use an Appropriate Certificate Authority for User Base ===
  
 +
=== Rule #7 - Only Support Strong Cryptographic Algorithms<br> ===
  
=== Certificate &amp;&nbsp;Protocol Configuration ===
+
=== Rule #8 - Only Support Strong Protocols ===
  
Configuration
+
=== Rule #9 - Establish a Strong Private Key for the Server ===
  
 
=== Certificate Considerations  ===
 
=== Certificate Considerations  ===

Revision as of 01:41, 6 October 2009

Page is under contruction - [email protected]

Introduction

Benefits

Confidentiality

Integrity

Replay Protection

End Point Authentication

Rules for Transport Layer Protection

Secure Server Design

Rule #1 - Use SSL for All Login Pages and All Authenticated Pages

Rule #2 - Use SSL on Any Networks (External and Internal) Transmiting Sensitive Data

Rule #3 - Do Not Provide Non-SSL Pages for Secure Content

Rule #4 - Do Not Perform Redirectsfrom Non-SSL Login to SSL Login Page

Rule #5 - Do Not Mix SSL and Non-SSL Content

Server Certificate & Protocol Configuration

Rule #6 - Use an Appropriate Certificate Authority for User Base

Rule #7 - Only Support Strong Cryptographic Algorithms

Rule #8 - Only Support Strong Protocols

Rule #9 - Establish a Strong Private Key for the Server

Certificate Considerations

Client Configuration

Certificate Validation

Trusted Root Store

Revocation List Checking

Additional Controls