Weak OS Hardening, Misconfigured Group Policies / Registry / Firewall rules etc., Missing File Type check for File Processing Apps, Misconfigured Named-Pipes, misconfigured 3rd party services, etc. Weak File/Folder Permission per User Role, Missing Principle of Least Privilege approach, Improper User Roles Weak Keys or Usage of Outdated Cryptographic Algirithms, Inappropriate usage of Cryptographic Functions, reuse of Cryptographic Parameters across all Installations, Improper usage of Cryptography for Integrity check for Network Shared Drives or other Peripheral devicesĭata in Memory post App Logout, Logs with Sensitive Info., Hardcoded Secrets in files, etc. for Import / Export with external Drive, Auth. OS / DesktopApp account Authentication & Session Management, Auth. OWASP Top 10 Desktop AppĭA2 - Broken Authentication & Session Management Using the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces more secure code. Globally recognized by developers as the first step towards more secure coding.Ĭompanies should adopt this document and start the process of ensuring that their desktop applications minimize these risks. It represents a broad consensus about the most critical security risks to Desktop applications. Security Top 10 is a standard awareness document for developers, product owners and security engineers. OWASP Top 10 Desktop Application Security Risks (2021) | Quick Reference Table
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |