You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: practices/security.md
+21-1Lines changed: 21 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@
30
30
- Guard against time based authentication attacks, e.g. using a WAF
31
31
- Guarded against invalid **certificates** e.g. expiry monitoring.
32
32
- Consider [OCSP stapling](https://blog.cloudflare.com/high-reliability-ocsp-stapling/) for improved performance
33
-
- Ensure **cookies** cannot leak from production to non-produnction environments e.g. avoid non-produnction on subdomain of production domain
33
+
- Ensure **cookies** cannot leak from production to non-production environments e.g. avoid non-production on subdomain of production domain
34
34
- Prevent **[clickjacking](https://sudo.pagerduty.com/for_engineers/#clickjacking)** with `X-Frame-Options`
35
35
- Be careful not to **leak information**, e.g. error messages, stack traces, headers
36
36
-**Don't trust** yourself or others!
@@ -98,6 +98,26 @@
98
98
}
99
99
```
100
100
</details>
101
+
102
+
<details><summary>If enforcement is not possible / appropriate, use alerts to identify potential issues: example AWS Config rule to identify public-facing RDS databases (click to expand)</summary>
"Description": "Checks whether the Amazon Relational Database Service (RDS) instances are not publicly accessible. The rule is non-compliant if the publiclyAccessible field is true in the instance configuration item."
0 commit comments