Prevent sensitive data: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 19: | Line 19: | ||
** Personal data, trade union membership, genetic, bio metric, health data | ** Personal data, trade union membership, genetic, bio metric, health data | ||
*Business requirements | *Business requirements | ||
=Attacks= | |||
==OWASP Scope== | |||
The OWASP scope includes | |||
*External attacks only | |||
*Two extremes of user types | |||
**Anonymous users | |||
**Highly Privileged users | |||
==Web Applications== | |||
Attacks can happen | |||
*Connection between browser and app | |||
*Connection between app and DB | |||
*Database or database management system | |||
*Web browser | |||
Categories of Attack can be | |||
*Data In-transit, connections | |||
**Inbound, code that does authentication, authorization, validation or logging | |||
**Outbound,cryptography and auditing code | |||
*Data at rest, files or software |
Revision as of 04:36, 4 September 2020
Sensitive Data
Sensitive Data is the set of data that contains elements from user data, application data and data protecting data such that user data is not exposed to unauthorized parties
- Application Data
- Configuration Data
- Logging Data
- Application Data
- User Data
- Personal Information
- Personal Identification Information, drivers license
- Data Protecting Data
- Cryptokey
- Passkeys
- Access Control lists
Just because it can contain sensitive data, it does not mean it is. Controls can be put in place to manage it such as in development or via business process.
- Not all user data
- Logging files
Data Classification can be by either
- Laws, GDPR, PCI DSS, can include but not exclusive to
- Personal data, trade union membership, genetic, bio metric, health data
- Business requirements
Attacks
OWASP Scope
The OWASP scope includes
- External attacks only
- Two extremes of user types
- Anonymous users
- Highly Privileged users
Web Applications
Attacks can happen
- Connection between browser and app
- Connection between app and DB
- Database or database management system
- Web browser
Categories of Attack can be
- Data In-transit, connections
- Inbound, code that does authentication, authorization, validation or logging
- Outbound,cryptography and auditing code
- Data at rest, files or software