-
-
Notifications
You must be signed in to change notification settings - Fork 396
Description
These are SCP coding practices used during Cornucopia threat modeling sessions that we could add here.
SCP [138] Do not include sensitive information in HTTP GET request parameters
I would say this is similar to ASVS 14.2.1
SCP [138] is referred to in SM9.
Suggestion: Do not include sensitive information in the URL or query string, such as an API key or session token
SCP [140] Disable client side caching on pages containing sensitive information. Cache-Control: no-store, may be used in conjunction with the HTTP header control "Pragma: no-cache", which is less effective, but is HTTP/1.0 backward compatible
I would say this is similar to ASVS 14.3.2
SCP [140] is referred to in AZ3 and AT3.
Suggestion: Disable client side caching on pages containing sensitive information (e.g. Cache-Control: no-store)