You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
To enhance security awareness and provide quick access to critical security configurations, we propose adding a "Security Settings" page to the App Panel at the project level. This page would offer a checklist-style interface, displaying various security-related features and their statuses. This approach would allow users/admins to verify and ensure adherence to application security from the App Panel.
Proposed Checklist for Security Settings (WIP):
The Security Settings page should display the following items, with a visual indicator (e.g., green for secure, red for insecure) for each:
Debug Mode: Verify if Debug = False.
IP Restriction: Ensure App Panel access is IP-restricted. Show the allowed IP's
Account Lockout Time: Display the duration of account lockouts after failed attempts.
Allowed Password Attempts: Show the configured limit for failed login attempts.
Password Age: Display the maximum age for passwords before expiration.
HTTPS Only: Verify if HTTPS-only is enforced.
Password Age Policies: Check if password age policies are in place for all users.
Password Strength Policies: Confirm if password strength requirements (e.g., complexity, length) are enforced for all users.
Default IDs or Passwords: Ensure no default IDs or passwords are active in production.
Concurrent Sessions Disabled: Verify if concurrent sessions are disallowed to prevent session hijacking.
Server Time Synchronization: Confirm if the server time is synchronized with NTP.
Two-Factor Authentication (2FA): Check if 2FA is enforced for all user accounts in applications.
SSO/OIDC: Verify if users SSO/OIDC is enforced for all application users.
Cross-Site Scripting (XSS) Protection: Verify if XSS protection headers are enabled in the HTTP response (e.g., X-XSS-Protection).
Content Security Policy (CSP): Ensure a Content Security Policy is set to help prevent data injection attacks like XSS.
SQL Injection Protection: Confirm that prepared statements or ORM protections are in place to prevent SQL injection vulnerabilities.
Clickjacking Protection: Check for X-Frame-Options headers to prevent clickjacking attacks.
Secure Cookies: Verify that cookies have secure and HttpOnly flags set to prevent access by JavaScript and ensure they’re sent only over HTTPS.
API Rate Limiting: Ensure API endpoints have rate-limiting mechanisms to mitigate brute-force and DoS attacks.
Audit Logging: Confirm if audit logging is enabled for critical actions (e.g., login attempts, password changes, sensitive data access).
Data Encryption in Transit: Verify that data in transit is encrypted, typically with TLS, for secure communication.
Security Headers Compliance: Check for other essential HTTP security headers (e.g., Strict-Transport-Security, X-Content-Type-Options, Referrer-Policy).
External Resources Control: Confirm that only trusted and necessary external resources (e.g., JavaScript libraries, stylesheets) are allowed.
Acceptance Criteria:
Security Settings page displays all checklist items listed above.
Each item reflects the current configuration status (e.g., enabled/disabled, compliant/non-compliant).
Clear, color-coded indicators (e.g., green/red) for secure/insecure status for each setting.
Tooltip or additional information option for each item to provide further guidance on compliance.
The text was updated successfully, but these errors were encountered:
Description:
To enhance security awareness and provide quick access to critical security configurations, we propose adding a "Security Settings" page to the App Panel at the project level. This page would offer a checklist-style interface, displaying various security-related features and their statuses. This approach would allow users/admins to verify and ensure adherence to application security from the App Panel.
Proposed Checklist for Security Settings (WIP):
The Security Settings page should display the following items, with a visual indicator (e.g., green for secure, red for insecure) for each:
Debug = False
.X-XSS-Protection
).X-Frame-Options
headers to prevent clickjacking attacks.HttpOnly
flags set to prevent access by JavaScript and ensure they’re sent only over HTTPS.Strict-Transport-Security
,X-Content-Type-Options
,Referrer-Policy
).Acceptance Criteria:
The text was updated successfully, but these errors were encountered: