mirror of
https://github.com/adidas/api-guidelines.git
synced 2025-10-25 15:19:19 +00:00
Updates execution/security.md
Auto commit by GitBook Editor
This commit is contained in:
@@ -38,7 +38,7 @@ Everything you know about [input validation](https://www.owasp.org/index.php/Dat
|
||||
* XML input validation: XML-based services MUST ensure that they are protected against common XML based attacks by using secure XML-parsing. This typically means protecting against XML External Entity attacks, XML-signature wrapping etc.
|
||||
|
||||
# Escape Content
|
||||
This means removing any executable code that would cause the browser to do something you don’t want it to. Typically this means removing // <_Prevention_Cheat_Sheet
|
||||
) for more information on how to implement CSRF-protection.
|
||||
|
||||
CSRF is easily achieved even using random tokens if any XSS exists within your application, so PLEASE MAKE SURE you understand [how to prevent XSS](https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet).
|
||||
|
||||
# 12 Insecure direct object references:
|
||||
A URL or even a POSTed form should NEVER contain an access control "key" or similar that provides automatic verification. A data contextual check needs to be done, server side, with each request.
|
||||
|
||||
# 13 Enable CORS for all APIs:
|
||||
When your API's resources receive requests from a domain other than the API's own domain, you MUST enable cross-origin resource sharing (CORS) for selected methods on the resource. This amounts to having your API respond to the OPTIONS preflight request with at least the following CORS-required response headers:
|
||||
* Access-Control-Allow-Methods
|
||||
* Access-Control-Allow-Headers
|
||||
* Access-Control-Allow-Origin
|
||||
|
||||
* Access-Control-Allow-Methods
|
||||
* Access-Control-Allow-Headers
|
||||
* Access-Control-Allow-Origin
|
||||
|
||||
# 14 Data in transit:
|
||||
Unless the public information is completely read-only, the use of TLS v1.2 should be MANDATED, particularly where credentials, updates, deletions, and any value transactions are performed. The overhead of TLS is negligible on modern hardware, with a minor latency increase that is more than compensated by safety for the end user.
|
||||
|
||||
Reference in New Issue
Block a user