Configuration best practice guidance needs to be reviewed periodically, vulnerability announcements monitored, and configuration standards updated.
NB: The key concept for this card is weak configuration rather than missing encryption.
Gunter can intercept or modify encrypted data in transit because the protocol is poorly deployed, or weakly configured, or certificates are invalid, or certificates are not trusted, or the connection can be degraded to a weaker or un-encrypted communication
Owasp ASVS (4.0): 1.9.2 ,6.2.7 ,9.1.1 ,9.2.1 ,9.2.4 ,14.4.5
Owasp SCP: 75,144,145,148
Owasp Appsensor: IE4
Safecode: 14,29,30
ASVS V1.9 - Communications Architectural Requirements
ASVS V9.1 - Communications Security Requirements
ASVS V9.2 - Server Communications Security Requirements
ASVS V14.4 - HTTP Security Headers Requirements
Password Guessing/Brute Force Attacks
Session Hijacking (Man-in-the-Middle)
Loading comments 0%