Skip to content

Commit 0ed8c34

Browse files
Add links 2021 OWASP Top 10 ossf#5 (security misconfiguration)
Signed-off-by: David A. Wheeler <[email protected]>
1 parent af88e7f commit 0ed8c34

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

secure_software_development_fundamentals.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1856,7 +1856,7 @@ Most larger systems need some mechanism to receive configuration information. Ma
18561856

18571857
Some systems try to depend on *secure boot* or similar mechanisms to ensure that only specific software is run on a particular computer. Don’t take these mechanisms very seriously if the computer (such as a smartphone) may be physically controlled by a potential attacker. If an attacker has physical control over a device, then that attacker has ultimate control over the device. The reality is that secure boot systems have been repeatedly broken; trusting this to never happen in the future is ignoring the lessons of the past. You are better off designing your system so that you don’t need to trust the application on that device, but instead run software you need to trust on hardware controlled by someone you trust. Secure boot systems are far more powerful if the system is physically controlled by a trusted party, because then they are simply providing an additional protective measure for the one physically in control.
18581858

1859-
🔔 Security misconfiguration is such a common mistake in web applications that it is 2017 OWASP Top 10 #6. 2021 CWE Top 25 #19 [CWE-276](https://cwe.mitre.org/data/definitions/276.html) covers Incorrect Default Permissions.
1859+
🔔 Security misconfiguration is such a common mistake in web applications that it is 2017 OWASP Top 10 #6 and 2021 OWASP Top 10 #5. 2021 CWE Top 25 #19 [CWE-276](https://cwe.mitre.org/data/definitions/276.html) covers Incorrect Default Permissions.
18601860

18611861
### Quiz 1.10
18621862

@@ -4594,7 +4594,7 @@ Note that our earlier discussion about software acquisition discussed distributi
45944594

45954595
When fielding/deploying:
45964596

4597-
* Configure your production environment to be secure, including all components you depend on, and keep it updated. Security misconfiguration is such a common mistake in web applications that it is 2017 OWASP Top 10 #6. For example:
4597+
* Configure your production environment to be secure, including all components you depend on, and keep it updated. For example:
45984598

45994599
* Your environment should be configured to provide least privilege and use maximum security settings your system allows.
46004600

@@ -4630,7 +4630,7 @@ When operating:
46304630

46314631
When disposing, make sure you fully destroy any data you are supposed to destroy. Just removing a file does not actually remove its contents from most storage devices.
46324632

4633-
🔔 Protecting automatic update functionality is considered part of 2021 OWASP Top 10 #8 (A08:2021), *Software and Data Integrity Failures*. Using components with known vulnerabilities is such a common web application vulnerability that it is 2017 OWASP Top 10 #9. Insufficient logging and monitoring is such a common web application vulnerability that it is 2017 OWASP Top 10 #10.
4633+
🔔 Security misconfiguration is such a common mistake in web applications that it is 2017 OWASP Top 10 #6 and 2021 OWASP Top 10 #5. Protecting automatic update functionality is considered part of 2021 OWASP Top 10 #8 (A08:2021), *Software and Data Integrity Failures*. Using components with known vulnerabilities is such a common web application vulnerability that it is 2017 OWASP Top 10 #9. Insufficient logging and monitoring is such a common web application vulnerability that it is 2017 OWASP Top 10 #10.
46344634

46354635
### Quiz 4.3
46364636

0 commit comments

Comments
 (0)