File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed
docs/en/04-design/02-web-app-checklist Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -11,7 +11,7 @@ and use the list below as suggestions for a checklist that has been tailored for
11112 . Log all apparent tampering events, that involve changes to data and state that should not be modifiable
12123 . Log requests that violate server-side access control rules
13134 . Encode and validate any dangerous characters before logging to prevent log injection attacks
14- 5 . Do not log sensitive information, including unnecessary system details, session identifiers or passwords
14+ 5 . Do not log sensitive information such as unnecessary system details, session identifiers or passwords
15156 . Logging controls should support both success and failure of specified security events
16167 . Use a cryptographic hash function to validate log entry integrity
17178 . Log attempts to authenticate with invalid or expired credentials
You can’t perform that action at this time.
0 commit comments