Domain 4
Domain 4
Domain 4
Understanding API’s
Best practice to transfer data is using rest because it is simpler and more scalable and give
high performance and support many different formats.
• Failure to restrict access to privileged functionalities or URLs. Web pages that provide
administrative functionality are the primary targets for such brute force attacks Mitigation
8) Cross-site request forgery (CSRF)
• A CSRF attack forces a logged‐on victim’s browser to send a forged HTTP request, including the
victim’s session cookie and any other automatically included authentication information, to a
vulnerable web application. This allows the attacker to force the victim’s browser to generate
requests the vulnerable application thinks are legitimate requests from the victim
• Do not save username/password in the browser.
• Do not check the “remember me” option in websites.
• Do not use the same browser to surf the Internet and access sensitive websites at the same time, if
you are accessing both from the same machine.
• Read standard emails in plain text.
• Explicitly log off after using a web application.
• Use client‐side browser extensions that mitigate CSRF attacks
• Implement the software to use a unique session specific token (called a nonce) that is generated in a
random, non‐predictable, non‐guessable and/or sequential manner.
• CAPTCHAs can be used to establish specific token identifiers per session.
• The uniqueness of session tokens is to be validated on the server side and not be solely dependent
on client-based validation.
• Use POST methods instead of GET requests for sensitive data transactions and privileged and
state change transactions, along with randomized session identifier generation and usage
9) Using known vulnerable components
• Components, such as libraries, frameworks, and other software modules, almost always run with
full privileges. If a vulnerable component is exploited, such an attack can facilitate serious data
loss or server takeover. Applications using components with known vulnerabilities may undermine
application defenses and enable a range of possible attacks and impacts
• Deprecated, insecure and banned APIs
10)Unvalidated redirects and forwards
• Web applications frequently redirect and forward users to other pages and websites, and use
untrusted data to determine the destination pages. Without proper validation, attackers can redirect
victims to phishing or malware sites, or use forwards to access unauthorized pages
Threat Modeling
Threat modeling is performed once An application design is created.
• CIA Triad
• Tools for Threat
• Modeling
• Data Flow Diagrams
• Use/Misuse Cases
Data Flow Diagrams
• Blue circles are data transformations
(processing).
• Arrows are data flows.
• The "Student database" is a data store
USE/MISUSE CASES
Threat Modeling: Stride