X-Git-Url: https://git.martlubbers.net/?a=blobdiff_plain;f=report%2Fv8_error.tex;h=e6b2776febefc94d2d4ea7a20226de42dd9a05a2;hb=bc43a4232e031c20cbd65dfb0c5d20b36dde542f;hp=d839e866898bcc040703dd4c7f726f7014e8472e;hpb=cec1626467aba77acc0b87560a1f73887dbaab72;p=ssproject1617.git diff --git a/report/v8_error.tex b/report/v8_error.tex index d839e86..e6b2776 100644 --- a/report/v8_error.tex +++ b/report/v8_error.tex @@ -1,4 +1,4 @@ -\begin{enumerate}[label={8.\arabic*}] +\begin{enumerate}[label={V8.\arabic*}] \item\fail{} Verify that the application does not output error messages or stack traces containing sensitive data that could assist an attacker, @@ -77,41 +77,29 @@ Documentation suggesting users should verify that the database driver they end up using doesn't include sensitive data in exception messages is absent. \end{result} - \item\pass{} Verify that all non-printable symbols and field +\notapplicable{\item Verify that all non-printable symbols and field separators are properly encoded in log entries, to - prevent log injection. + prevent log injection.} - \begin{result} - \end{result} - - \item\pass{} Verify that log fields from trusted and untrusted - sources are distinguishable in log entries. - - \begin{result} - \end{result} +\notapplicable{\item Verify that log fields from trusted and untrusted + sources are distinguishable in log entries.} \item\fail{} Verify that an audit log or similar allows for non-repudiation of key transactions. \begin{result} - Failed login attempts, password reset, login/logout... are not logged at all. + Failed login attempts, password reset, login/logout\ldots are not logged at all. It's not possible to retreive the IP address from which a password reset has been issued. Only potential requests are logged even before it's verified such an action exists. \end{result} - \item\pass{} Verify that security logs have some form of +\notapplicable{\item Verify that security logs have some form of integrity checking or controls to prevent - unauthorized modification. - - \begin{result} - \end{result} + unauthorized modification.} - \item\pass{} Verify that the +\notapplicable{\item Verify that the logs are stored on a different partition than the application is running with - proper log rotation. - - \begin{result} - \end{result} + proper log rotation.} \item\fail{} Time sources should be synchronized to ensure logs have the correct time. @@ -120,4 +108,4 @@ Time information is not inserted into log messages. The actual log files however are named after the current system date, this gives a precision of 24 hours. \end{result} -\end{enumerate} \ No newline at end of file +\end{enumerate}