-
Notifications
You must be signed in to change notification settings - Fork 213
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Support Integration] Security Checklist #741
Comments
This issue is for the Support Panel correct? I know that it will required VPN to access. Anything on the list can be skipped/checked given that requirement? |
Yes, for the support panel. Everything should still get checked off though |
@g-k ran a code review, results are here: https://docs.google.com/document/d/1I2eqsc_fe8_2qsB7WOe_rsW9FyORxCpiOiTUPD4PzNE/edit takeaways:
In addition, @jrgm locking down the db user. |
⬆️ I created an issue for the uid and requestTicket validation. |
@jrgm what are the staging and production urls of this service? |
stage: https://fxa-support-panel.stage.mozaws.net @jrgm do we need to change the prod url before it goes live? |
That prod URL is fine with me, fwiw. This is an internal service. |
Alright, this is done. |
Risk Management
Infrastructure
strict-transport-security: max-age=31536000
services.mozilla.com
, it must be manually added to Firefox's preloaded pins. This only applies to production services, not short-lived experiments.X-Forwarded-For
to all back-end services.Development
npm audit
with audit-filter to review and handle exceptions (see example in speech-proxy)pip list --outdated
or requires.io or pyup outdated checkscargo update
and cargo upgrade when changing versionsDual Sign Off
Logging
Web Applications
/__cspreport__
endpointdefault-src 'none'; frame-ancestors 'none'; base-uri 'none'; report-uri /__cspreport__
to disallowing all content rendering, framing, and report violationsnone
, frame-src, and object-src should benone
or only allow specific originsSecurity Features
extensions.webextensions.restrictedDomains
. This will prevent a malicious extension from being able to steal sensitive information from it, see bug 1415644.Databases
Common issues
target="_blank"
in external links unless you also userel="noopener noreferrer"
(to prevent Reverse Tabnabbing)The text was updated successfully, but these errors were encountered: