This is a personal summary of my studies on the OWASP Top 10 Proactive Controls, aimed at helping me easily index and recall key topics. Additionally, I’ve created a project to consolidate my learnings. You can check out the Project Specifications for more details.
- Implement Access Control
- Role Based Access Control (RBAC)
- Attribute based access Control (ABAC)
- Features denied by default
- Just Enough Access (JEA)
- Use Cryptography the proper way
- Classify data types in your application (public, private, sensitive)
- Never transmit plain-text data (TLS)
- Hash or cripto sensitive data (passwords for instance)
- Use Application SEcrets Management (AWS Secrets Manager) to keys
- Rotate keys (key rollover)
- All authorized access to secret key MUST be logged
- Use TLS
- Validate all Input and Handle Exceptions
- Syntatic validity (type validations like is number, has lenght x)
- Semantic validity (range validation)
- Allowlisting and Denylisting
- Client Side and Server side validation
- Care for ReDoS
- Limit input validation (Prevent DDoS)
- Sanitize input (prevent XSS, SQL Injection, etc)
- Address Security from the start
- Keep it simple (KISS)
- Identify and minimize exposed components
- Design for Defense-in-Depth
- Use well know secure architecture patterns
- Secure by default configurations
- Implement configurations based on Least Privilege principle
- Access is denied by default
- Prefer for infrastructure as Code
- Keep your Components Secure
- Update dependencies
- Check if dependency is ok to use
- Sources
- Popularity
- Activity
- Maturity
- Complexity
- Security
- Implement Digital Identity
- Authentication Assurance Levels
- Passwords
- Multi-Factor Authentication
- Cryptographic Based Authentication
- Sesion Management
- Secure password recovery mechanism
- Secure password storage
- JWT with signature
- Cookies with
- Set right domain
- secure flag
- HttpOnly
- samesite
- Authentication Assurance Levels
- Leverage Browser Security Features
- HTTP Strict Transport Security (HSTS)
- Content Security Policy (CSP)
- Referrer-Policy
- Cookie secure flag
- Host Allowlist CSP
- Strict CSP
- Prevent Clickjacking
- X-Frame-Options (XFO)
- CSP
- Prevent CSRF Attacks
- Same-Origin Cookies
- Fetch Metadata Request Headers
- Implement Security Logging and MOnitoring
- Log suspicious activity
- monitor for suspicious data
- Stop Server Side Request Forgery