📗
Application Security Manual
  • Intro
    • Start Here
  • Vulnerabilities & Code
    • Injection Vulnerabilities
      • SQL Injection
      • Server-Side Template Injection (SSTI)
      • XPath Injection
      • XML External Entity (XXE) Injection
      • HTTP Request Smuggling
      • Insecure Deserialization
    • Input-based Vulnerabilities
      • Cross-Site Scripting (XSS)
      • Content Security Policy (CSP) Misconfiguration
      • HTTP Parameter Pollution
    • Origin-related Vulnerabilities
      • Cross-Site Request Forgery (CSRF)
      • Server-Side Request Forgery (SSRF)
      • Cross-Origin Resource Sharing (CORS) Misconfiguration
    • Access-related Vulnerabilities
      • Insecure Direct Object References (IDOR)
      • Authorization Code Interception
      • Session Hijacking
      • Insufficient Transport Layer Security (TLS)
      • JSON Web Token (JWT) Vulnerabilities
      • Insecure Client-Side Storage of JWTs
    • Logic & Timing Vulnerabilities
      • Business Logic Flaws
      • Type Juggling (Loose Type Comparison)
      • Timing Attack
  • Design Review
    • Product Security Design Review Framework
    • Security Design Review Checklist
  • Concepts & Culture
    • Implementing SAST Through Security-Driven Developer Culture
    • Security as Code: Baking Security into DevOps
Powered by GitBook
On this page
  1. Design Review

Security Design Review Checklist

Architecture and Design Principles

Authentication and Access Control

Data Protection

System Hardening

Network Security

Logging and Monitoring

Incident Response and Recovery

Third-Party Dependencies

Compliance and Regulatory Requirements

This tailored checklist focuses specifically on the design review aspects of the security design review framework. It covers various areas such as architecture, data protection, system hardening, network security, logging and monitoring, incident response, and compliance. Adapt and modify this checklist as needed to align with your organization's specific requirements and the complexity of the systems or applications being reviewed.

PreviousProduct Security Design Review FrameworkNextImplementing SAST Through Security-Driven Developer Culture

Last updated 1 year ago