This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Transport Layer Protection Cheat Sheet"

From OWASP
Jump to: navigation, search
m
m
Line 26: Line 26:
  
 
=== Rule #5 - Do Not Mix SSL and Non-SSL Content  ===
 
=== Rule #5 - Do Not Mix SSL and Non-SSL Content  ===
 +
 +
  
 
== Server Certificate & Protocol Configuration  ==
 
== Server Certificate & Protocol Configuration  ==
  
=== Rule #6 - Use an Appropriate Certificate Authority for User Base ===
+
=== Rule #6 - Use an Appropriate Certificate Authority for the Application's User Base ===
  
=== Rule #7 - Only Support Strong Cryptographic Algorithms<br> ===
+
=== Rule #7 - Only Support Strong Cryptographic Algorithms<br> ===
  
=== Rule #8 - Only Support Strong Protocols ===
+
=== Rule #8 - Only Support Strong Protocols ===
  
 
=== Rule #9 - Establish a Strong Private Key for the Server ===
 
=== Rule #9 - Establish a Strong Private Key for the Server ===
  
=== Certificate Considerations  ===
+
=== Rule #10 - Use a Certificate That Supports All Available Domain Names<br> ===
 +
 
 +
 
 +
 
 +
 
  
 
== Client Configuration  ==
 
== Client Configuration  ==

Revision as of 01:55, 6 October 2009

Page is under contruction - [email protected]

Introduction

Benefits

Confidentiality

Integrity

Replay Protection

End Point Authentication

Rules for Transport Layer Protection

Secure Server Design

Rule #1 - Use SSL for All Login Pages and All Authenticated Pages

Rule #2 - Use SSL on Any Networks (External and Internal) Transmiting Sensitive Data

Rule #3 - Do Not Provide Non-SSL Pages for Secure Content

Rule #4 - Do Not Perform Redirectsfrom Non-SSL Login to SSL Login Page

Rule #5 - Do Not Mix SSL and Non-SSL Content

Server Certificate & Protocol Configuration

Rule #6 - Use an Appropriate Certificate Authority for the Application's User Base

Rule #7 - Only Support Strong Cryptographic Algorithms

Rule #8 - Only Support Strong Protocols

Rule #9 - Establish a Strong Private Key for the Server

Rule #10 - Use a Certificate That Supports All Available Domain Names

Client Configuration

Certificate Validation

Trusted Root Store

Revocation List Checking

Additional Controls