Skip to content

Commit

Permalink
deleted 13.2.4 description (OWASP#971)
Browse files Browse the repository at this point in the history
  • Loading branch information
Elar Lang committed Oct 25, 2021
1 parent f39a965 commit ba03e5e
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion 4.0/en/0x21-V13-API.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ Once the JSON schema validation standard is formalized, ASVS will update its adv
| **13.2.1** | Verify that enabled RESTful HTTP methods are a valid choice for the user or action, such as preventing normal users using DELETE or PUT on protected API or resources. |||| 650 |
| **13.2.2** | Verify that JSON schema validation is in place and verified before accepting input. |||| 20 |
| **13.2.3** | Verify that RESTful web services that utilize cookies are protected from Cross-Site Request Forgery via the use of at least one or more of the following: double submit cookie pattern, CSRF nonces, or Origin request header checks. |||| 352 |
| **13.2.4** | Verify that REST services have anti-automation controls to protect against excessive calls, especially if the API is unauthenticated. | ||| 770 |
| **13.2.4** | [DELETED, DUPLICATE OF 11.1.4] | | | | |
| **13.2.5** | Verify that REST services explicitly check the incoming Content-Type to be the expected one, such as application/xml or application/json. | ||| 436 |
| **13.2.6** | Verify that the message headers and payload are trustworthy and not modified in transit. Requiring strong encryption for transport (TLS only) may be sufficient in many cases as it provides both confidentiality and integrity protection. Per-message digital signatures can provide additional assurance on top of the transport protections for high-security applications but bring with them additional complexity and risks to weigh against the benefits. | ||| 345 |

Expand Down

0 comments on commit ba03e5e

Please sign in to comment.