Skip to content

Commit 556d311

Browse files
committed
#123 Adding SCP [83, 85, 86, 89, 90, 91, 93, 100] Cornucopia - Access Control
1 parent 8fa0fc4 commit 556d311

File tree

3 files changed

+20
-1
lines changed

3 files changed

+20
-1
lines changed

.wordlist-en.txt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -524,9 +524,10 @@ wstg
524524
wtf
525525
www
526526
xsaero
527-
527+
BOPLA
528528
Roxana
529529
Amauri
530530
Bizerra
531531
Ebihara
532532
Yuuki
533+
BOPLA

docs/en/04-design/02-web-app-checklist/01-define-security-requirements.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ and use the lists below as suggestions for a checklist that has been tailored fo
1414
5. The security configuration store for the application should be available in human readable form to support auditing
1515
6. Isolate development environments from production and provide access only to authorized development and test groups
1616
7. Implement a software change control system to manage and record changes to the code both in development and production
17+
8. Restrict access to files or other resources, including those outside the application's direct control using an allow list
18+
or the equivalent thereof.
1719

1820
#### 2. Cryptographic practices
1921

docs/en/04-design/02-web-app-checklist/07-access-controls.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ and use the list below as suggestions for a checklist that has been tailored for
1212
3. Deny by default; if a request is not specifically allowed then it is denied
1313
4. Apply least privilege, providing the least access as is necessary
1414
5. Log all authorization events
15+
6. Create unit and integration test to document and verify an application's business rules, data types and access
16+
authorization criteria and/or processes so that access can be properly provisioned and controlled for restricting
17+
function-level, data-specific, and field-level access based on consumer permissions and resource attributes
18+
7. Access Control criteria and/or processes not testable through automated tests should be documented so that they
19+
can be manually tested
1520

1621
#### 2. Access control
1722

@@ -26,6 +31,17 @@ and use the list below as suggestions for a checklist that has been tailored for
2631
8. If long authenticated sessions are allowed, periodically re-validate a user's authorization
2732
9. Implement account auditing and enforce the disabling of unused accounts
2833
10. The application must support termination of sessions when authorization ceases
34+
11. Restrict function-level access to consumers with explicit permissions
35+
12. Restrict direct object references to only authorized users with explicit permissions to specific data items
36+
to mitigate insecure direct object reference (IDOR) and broken object level authorization (BOLA)
37+
13. Restrict access to user and data attributes to consumers with explicit permissions to specific fields to mitigate broken
38+
object property level authorization (BOPLA)
39+
14. Restrict access security-relevant configuration information to only authorized users who have been allowed access through
40+
multiple layers of security, including continuous consumer identity verification, device security posture assessment, and
41+
contextual risk analysis
42+
15. Server side implementation and presentation layer representations of access control rules should not differ in such a way
43+
that they allow for business functionality and rules to be compromised
44+
16. Enforce application logic flows to comply with business rules
2945

3046
#### References
3147

0 commit comments

Comments
 (0)