File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
docs/en/04-design/02-web-app-checklist Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ and use the list below as suggestions for a checklist that has been tailored for
88#### 1. Security logging
99
10101 . Log submitted data that is outside of an expected numeric range
11- 2 . Log all apparent tampering events, that involves changes to data and state that should not be modifiable
11+ 2 . Log all apparent tampering events, that involve changes to data and state that should not be modifiable
12123 . Log requests that violate server-side access control rules
13134 . Encode and validate any dangerous characters before logging to prevent log injection attacks
14145 . Do not log sensitive information, including unnecessary system details, session identifiers or passwords
@@ -36,7 +36,7 @@ and use the list below as suggestions for a checklist that has been tailored for
3636#### 3. Monitoring
3737
38381 . Effective monitoring and alerting should be established to detect and respond to suspicious activities quickly
39- 2 . Account for attack patterns that bypass standard lockouts, like using the same passwords against multiple user accounts
39+ 2 . Account for attack patterns that bypass standard lockouts, such as using the same passwords against multiple user accounts
4040 while rotating IP addresses
4141
4242#### References
You can’t perform that action at this time.
0 commit comments