Verify that a secrets management solution such as a key vault is used to securely create, store, control access to and destroy secrets. (C8)
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 798
Verify that key material is not exposed to the application but instead uses an isolated security module like a vault for cryptographic operations. (C8)
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 320
Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.
Loading comments 0%