🔐 Security Checklist
Autogenerated by Copilot, Need Updates
Security Test Check
- XSS
- CSRF
- SQL Injection
- Clickjacking
- Memory Leak
- Input Sanitation
- Containerization
- Exposed Private Environment
- No Public Bucket (all bucket must private)
XSS
Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users.
Prevention
- Use
Content Security Policy(CSP) to prevent XSS attacks - Use
X-XSS-Protectionto prevent XSS attacks - Use
X-Content-Type-Optionsto prevent XSS attacks - Use
HTTPOnlyto prevent XSS attacks - Use
Secureto prevent XSS attacks - Use
SameSiteto prevent XSS attacks - Use
Escape Outputto prevent XSS attacks
CSRF
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.
Prevention
- Use
CSRF Tokento prevent CSRF attacks - Use
SameSiteto prevent CSRF attacks - Use
CORSto prevent CSRF attacks - Use
Originto prevent CSRF attacks - Use
Refererto prevent CSRF attacks - Use
Double Submit Cookieto prevent CSRF attacks
SQL Injection
SQL injection is a code injection technique that might destroy your database.
Prevention
- Use
Prepared Statementsto prevent SQL Injection - Use
Parameterized Queriesto prevent SQL Injection - Use
Stored Proceduresto prevent SQL Injection - Use
ORMto prevent SQL Injection - Use
Input Sanitizationto prevent SQL Injection
Clickjacking
Clickjacking is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
Prevention
- Use
X-Frame-Optionsto prevent Clickjacking - Use
Content Security Policy(CSP) to prevent Clickjacking - Use
Frame Ancestorsto prevent Clickjacking
Memory Leak
A memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations in such a way that memory which is no longer needed is not released.
Prevention
- Use
Memory Profilingto prevent Memory Leak - Use
Memory Managementto prevent Memory Leak - Use
Garbage Collectionto prevent Memory Leak - Use
Memory Leak Detectionto prevent Memory Leak
Input Sanitation
Input sanitation is the process of cleaning data from any input that is used by an application. This is done to prevent any malicious data from being executed by the application.
Prevention
- Use
Input Validationto prevent Input Sanitation - Use
Input Filteringto prevent Input Sanitation - Use
Input Escapingto prevent Input Sanitation - Use
Input Encodingto prevent Input Sanitation - Use
Input Sanitizationto prevent Input Sanitation
Containerization
Containerization is a lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment.
Prevention
- Use
Dockerto prevent Containerization - Use
Kubernetesto prevent Containerization - Use
Podmanto prevent Containerization - Use
LXCto prevent Containerization - Use
LXDto prevent Containerization
Exposed Private Environment
Exposed private environment is a condition where the private environment is exposed to the public.
Prevention
- Use
Private Networkto prevent Exposed Private Environment - Use
VPNto prevent Exposed Private Environment - Use
Firewallto prevent Exposed Private Environment - Use
Security Groupto prevent Exposed Private Environment
No Public Bucket
All bucket must private
Prevention
- Use
Private Bucketto prevent No Public Bucket - Use
Bucket Policyto prevent No Public Bucket - Use
ACLto prevent No Public Bucket - Use
IAMto prevent No Public Bucket - Use
VPC Endpointto prevent No Public Bucket - Use
CloudFrontto prevent No Public Bucket - Use
Origin Access Identityto prevent No Public Bucket - Use
Signed URLto prevent No Public Bucket - Use
Signed Cookieto prevent No Public Bucket - Use
Pre-Signed URLto prevent No Public Bucket - Use
Pre-Signed Cookieto prevent No Public Bucket - Use
CloudFront Signed URLto prevent No Public Bucket - Use
CloudFront Signed Cookieto prevent No Public Bucket - Use
CloudFront Pre-Signed URLto prevent No Public Bucket - Use
CloudFront Pre-Signed Cookieto prevent No Public Bucket - Use
CloudFront Origin Access Identityto prevent No Public Bucket - Use
CloudFront Origin Access Identityto prevent No Public Bucket - Use
CloudFront Origin Access Identityto prevent No Public Bucket - Use
CloudFront Origin Access Identityto prevent No Public Bucket