Difference between revisions of "Don’t trust services"

From OWASP
Jump to: navigation, search
m (Reverted edits by BastrOcmon (Talk) to last version by KirstenS)
 
(8 intermediate revisions by 3 users not shown)
Line 3: Line 3:
 
{{Template:Stub}}
 
{{Template:Stub}}
  
==Categories==
+
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 +
 
 +
<br>
 +
[[Category:OWASP ASDR Project]]
 +
 
 +
 
 +
==Description==
 +
 
 +
Services can refer to any external system.
 +
 
 +
Many organizations utilize the processing capabilities of third party partners, who likely have differing security policies and postures than they do. It is unlikely that you can influence or control any external third party, whether they are home users or major suppliers or partners.
 +
 
 +
Therefore, implicit trust of externally run systems is not warranted. All external systems should be treated in a similar fashion.
 +
 
 +
For example, a loyalty program provider provides data that is used by Internet Banking, providing the number of reward points and a small list of potential redemption items. However, the data should be checked to ensure that it is safe to display to end users, and that the reward points are a positive number, and not improbably large.
 +
 
 +
==Examples==
 +
 
 +
===Short example name===
 +
: A short example description, small picture, or sample code with [http://www.site.com links]
 +
 
 +
===Short example name===
 +
: A short example description, small picture, or sample code with [http://www.site.com links]
 +
 
 +
 
 +
==Related [[Vulnerabilities]]==
 +
 
 +
* [[Vulnerability 1]]
 +
* [[Vulnerabiltiy 2]]
 +
 
 +
 
 +
==Related [[Controls]]==
 +
 
 +
* [[Controls 1]]
 +
* [[Controls 2]]
 +
 
 +
 
 +
==References==
 +
 
 +
* http://www.link1.com
 +
* [http://www.link2.com Title for the link2]
 +
 
 +
 
 +
 
 +
__NOTOC__
 +
 
 +
==Overview==
 +
 
 +
 
  
 
[[Category:Principle]]
 
[[Category:Principle]]

Latest revision as of 11:45, 26 May 2009

This is a principle or a set of principles. To view all principles, please see the Principle Category page.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


Last revision (mm/dd/yy): 05/26/2009



Description

Services can refer to any external system.

Many organizations utilize the processing capabilities of third party partners, who likely have differing security policies and postures than they do. It is unlikely that you can influence or control any external third party, whether they are home users or major suppliers or partners.

Therefore, implicit trust of externally run systems is not warranted. All external systems should be treated in a similar fashion.

For example, a loyalty program provider provides data that is used by Internet Banking, providing the number of reward points and a small list of potential redemption items. However, the data should be checked to ensure that it is safe to display to end users, and that the reward points are a positive number, and not improbably large.

Examples

Short example name

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links


Related Vulnerabilities


Related Controls


References



Overview