Difference between revisions of "OWASP Top10:2021"

From Documentation
(Created page with "[https://owasp.org/Top10/ OWASP Top10:2021]")
 
Line 1: Line 1:
[https://owasp.org/Top10/ OWASP Top10:2021]
+
= OWASP Top 10 Security Concerns 2021 =
 +
 
 +
== A04:2021 - Insecure Design ==
 +
ZK 10.0.0 addresses insecure design by enhancing its security posture through specific features:
 +
* '''Stricter GET/POST Handling''': ZK 10.0.0 has improved how GET and POST requests are handled to prevent HTTP verb tampering attacks. The framework now returns a 404 error if an Asynchronous Update (AU) request is incorrectly sent via GET. This ensures that each HTTP method adheres to its intended use case and enhances overall security by adhering to the principle of strict method usage .
 +
* '''Enhanced Security Framework''': The integration of three powerful security checks into the CI/CD process is a key enhancement in ZK 10.0.0:
 +
  * '''Synk Scanning''': Analyzes both source code and third-party dependencies for vulnerabilities.
 +
  * '''CodeQL PR Scanning''': Uses GitHub's security analysis tool to assess pull requests for security flaws.
 +
  * '''SonarCube''': Performs a comprehensive scan of the source code to identify bugs, vulnerabilities, and other security risks .
 +
These integrated security features are part of ZK’s commitment to providing a secure development environment that helps developers build secure applications by design.
 +
 
 +
== A08:2021 - Software and Data Integrity Failures ==
 +
While the ZK Framework itself does not manage software and data integrity directly, it is advisable for applications leveraging ZK to implement proper controls. This includes secure build pipelines, artifact verification, and runtime protection mechanisms that maintain data integrity throughout the application lifecycle.
 +
 
 +
== A10:2021 - Server-Side Request Forgery (SSRF) ==
 +
ZK Framework provides mechanisms for making server-side requests, but protection against SSRF largely rests with the application developers. It is essential to employ strict input validation, use allowlisting for accessible internal systems, and restrict unnecessary HTTP endpoint exposures. Ensuring that URLs or resources requested by server-side components are validated and secure is crucial.
 +
 
 +
== Secure Coding Practices ==
 +
To further secure ZK-based applications, developers are encouraged to:
 +
* Validate all inputs to confirm they conform to expected formats and ranges.
 +
* Leverage ZK's built-in security features, such as disabling client-side script execution when not necessary.
 +
* Regularly update the ZK library to take advantage of security fixes and enhancements.

Revision as of 10:36, 13 May 2024

OWASP Top 10 Security Concerns 2021

A04:2021 - Insecure Design

ZK 10.0.0 addresses insecure design by enhancing its security posture through specific features:

  • Stricter GET/POST Handling: ZK 10.0.0 has improved how GET and POST requests are handled to prevent HTTP verb tampering attacks. The framework now returns a 404 error if an Asynchronous Update (AU) request is incorrectly sent via GET. This ensures that each HTTP method adheres to its intended use case and enhances overall security by adhering to the principle of strict method usage .
  • Enhanced Security Framework: The integration of three powerful security checks into the CI/CD process is a key enhancement in ZK 10.0.0:
 * Synk Scanning: Analyzes both source code and third-party dependencies for vulnerabilities.
 * CodeQL PR Scanning: Uses GitHub's security analysis tool to assess pull requests for security flaws.
 * SonarCube: Performs a comprehensive scan of the source code to identify bugs, vulnerabilities, and other security risks .

These integrated security features are part of ZK’s commitment to providing a secure development environment that helps developers build secure applications by design.

A08:2021 - Software and Data Integrity Failures

While the ZK Framework itself does not manage software and data integrity directly, it is advisable for applications leveraging ZK to implement proper controls. This includes secure build pipelines, artifact verification, and runtime protection mechanisms that maintain data integrity throughout the application lifecycle.

A10:2021 - Server-Side Request Forgery (SSRF)

ZK Framework provides mechanisms for making server-side requests, but protection against SSRF largely rests with the application developers. It is essential to employ strict input validation, use allowlisting for accessible internal systems, and restrict unnecessary HTTP endpoint exposures. Ensuring that URLs or resources requested by server-side components are validated and secure is crucial.

Secure Coding Practices

To further secure ZK-based applications, developers are encouraged to:

  • Validate all inputs to confirm they conform to expected formats and ranges.
  • Leverage ZK's built-in security features, such as disabling client-side script execution when not necessary.
  • Regularly update the ZK library to take advantage of security fixes and enhancements.