This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "URL Level Access Control Cheat Sheet"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
= DRAFT CHEAT SHEET - WORK IN PROGRESS =
+
== DRAFT CHEAT SHEET - WORK IN PROGRESS ==
 +
 
 +
 
 
=Introduction=
 
=Introduction=
  

Revision as of 10:35, 30 January 2013

DRAFT CHEAT SHEET - WORK IN PROGRESS

Introduction

This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.

What is URL Level Access Control?

Attacks on URL Level Access Control

URL Level Access Control Issues

Access Control Anti-Patterns

Order Specific Operations

Never Depend on Untrusted Data

Attacking Access Controls

Testing for Broken URL Level Access Control

Defenses Against URL Level Access Control Attacks

Best Practices

Best Practice: Code to the Activity

Best Practice: SOMETHING

Best Practice: SOMETHING ELSE

  • In Some Code
  (code*)here
  • In Some other code
  (code*)here

Best Practice: Verifying policy server-side

SQL Integrated Access Control

Examples

Related Articles

OWASP Cheat Sheets Project Homepage