Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auditlog scope is erg breed #324

Open
baszoetekouw opened this issue Aug 29, 2022 · 1 comment
Open

Auditlog scope is erg breed #324

baszoetekouw opened this issue Aug 29, 2022 · 1 comment
Assignees
Labels
audit Fixes relating to security audit

Comments

@baszoetekouw
Copy link
Member

Uit de audit:

[...] it may be worth reconsidering whether AuditLog should contain an audit trail of all actions application-wide. As illustrated by this ticket, a single mistake may grant a user access to AuditLog, which could in turn result in widespread information disclosure. In this way, the current implementation puts all eggs into one basket by mapping the AuditLog object to all contents of the audit_log SQL table entry.

Is er een manier om de scope van auditlog te beperken of dit endpoint beter te beschermen? Samen met het plsc endpoint is dit wel he punt waar je in 1x alle informatie over heel sram bij elkaar hebt.

@baszoetekouw baszoetekouw added the audit Fixes relating to security audit label Aug 29, 2022
@baszoetekouw baszoetekouw self-assigned this Aug 29, 2022
@baszoetekouw
Copy link
Member Author

Functioneel willen we dit houden (en specifieke informatie zelfs zichtbaarder maken in de juist context).

Even kijken of er privacy-by-design-principes zijn die we hierop kunnen toepassen. Moet bijvoorbeeld wel alles opgeslagen wordne, moeten we niet dingen expiren na X maanden, etc?

In bredere context bekijken --> JIRA

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
audit Fixes relating to security audit
Projects
Status: Icebox
Development

No branches or pull requests

1 participant