(no) OWASP Compliance
Translation needed
The content of this page was copied from another page tree and needs to be translated or updated.
When you finish translation, make sure to
-
Replace the label NEEDS-TRANSLATING with TRANSLATED
-
Remove this macro from the page
Introduction
OWASP covers Ten Most Critical Web Application Security Risks. This document lists these risks together with a short description on how we avoid them.
It would be bold to say that our application is 100% secure, but by following industry standards and recommendations we greatly reduce the risk of security related problems.
You can access the full document at this location: OWASP
OWASP is a document that represents a broad consensus about the most critical security risks to web applications.
OWASP Assesment Table
# | Title | Summary | Risk /threat status | Risk Assessment and Prevention |
---|---|---|---|---|
A01:2021 | Broken Access Control | Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits. | System utilizes several security mechanism which control what authenticated users are allowed to do and what data they could access. That includes:
For more information please refer to manual: (no) Sikkerhet. | |
A02:2021 | Cryptographic Failures | The first thing is to determine the protection needs of data in transit and at rest. For example, passwords, credit card numbers, health records, personal information, and business secrets require extra protection, mainly if that data falls under privacy laws, e.g., EU's General Data Protection Regulation (GDPR), or regulations, e.g., financial data protection such as PCI Data Security Standard (PCI DSS). | Preventive measures taken:
Datacenter meets security class 3 (SSF 200) requirements and implements:
Read more about Datacenter security: (no) Data Center Information | |
A03:2021 | Injection | An application is vulnerable to attack when:
| System utilizes following defensive techniques to prevent SQL injections:
NoSQL, OS and LDAP injections should not be possible. | |
A04:2021 | Insecure Design | Insecure design is a broad category representing different weaknesses, expressed as “missing or ineffective control design.” Insecure design is not the source for all other Top 10 risk categories. There is a difference between insecure design and insecure implementation. We differentiate between design flaws and implementation defects for a reason, they have different root causes and remediation. A secure design can still have implementation defects leading to vulnerabilities that may be exploited. An insecure design cannot be fixed by a perfect implementation as by definition, needed security controls were never created to defend against specific attacks. | This is a very broad and general requirement at the same time, assuming different ways of attack including simple abuse of the system. We believe that our system is designed "secure" for the type of data stored and possible use cases. To address a few related concerns:
| |
A05:2021 | Security Misconfiguration | The application might be vulnerable if the application is:
Without a concerted, repeatable application security configuration process, systems are at a higher risk. | Preventive measures taken:
| |
A06:2021 | Vulnerable and Outdated Components | You are likely vulnerable:
|
| |
A07:2021 | Identification and Authentication Failures | Confirmation of the user's identity, authentication, and session management is critical to protect against authentication-related attacks |
| |
A08:2021 | Software and Data Integrity Failures | Software and data integrity failures relate to code and infrastructure that does not protect against integrity violations. An example of this is where an application relies upon plugins, libraries, or modules from untrusted sources, repositories, and content delivery networks (CDNs). | Our system is delivered as a self contained solution that does not rely on any external sources. The system does not load anything dynamically (form trusted or untrusted sources). Application build process relies on internal package repository and not on online versions. Components are scanned for known vulnerabilities. | |
A09:2021 | Security Logging and Monitoring Failures | This category is to help detect, escalate, and respond to active breaches. Without logging and monitoring, breaches cannot be detected | Application produces logs for user actions and security events like changed permissions, login, document access etc. that can be easily reviewed by system administrator. Low level logs are managed in Elk/Kibana system. Application firewall is configured with OWASP ModSecurity Core Rule Set, further customized to meet our needs. | |
A10:2021 | Server-Side Request Forgery (SSRF) | SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL). | End user are not allowed to provide any external URLs as data sources for the system backend. |
Part of this document is based on copyrighted material from The OWASP Foundation, released under the Creative Commons Attribution Share-Alike 4.0 license.