Skip to content

Commit

Permalink
Add 4.1.6 about avoiding out of date permissions info to resolve #2059
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth authored Oct 31, 2024
1 parent 19755a0 commit a46bb04
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 1 deletion.
1 change: 0 additions & 1 deletion 5.0/en/0x12-V3-Session-management.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,6 @@ Token-based session management includes JWT, OAuth, SAML, and API keys. Of these
| **3.5.4** | [ADDED] Verify that stateless tokens are checked for expiration before processing them further. |||| 613 | |
| **3.5.5** | [ADDED] Verify that only algorithms on an allowlist can be used to create and verify cryptographically secured tokens, for a given context. The allowlist should include the permitted algorithms, ideally only either symmetric or asymmetric algorithms, and should not include the 'None' algorithm. If both symmetric and asymmetric are needed, additional controls should prevent key confusion. |||| 757 | |
| **3.5.6** | [ADDED] Verify that other, security-sensitive attributes of a stateless token are being verified. For example, in a JWT this may include issuer, subject, and audience. |||| 287 | |
| **3.5.7** | [ADDED] Verify that all active stateless tokens, which are being relied upon for access control decisions, are revoked when admins change the entitlements or roles of the user. |||| 613 | |

## V3.6 Federated Re-authentication

Expand Down
1 change: 1 addition & 0 deletions 5.0/en/0x12-V4-Access-Control.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ Access control deficiencies are unlikely to be discovered using generic automate
| **4.1.3** | Verify that the principle of least privilege exists - users should only be able to access functions, data files, URLs, controllers, services, and other resources, for which they possess specific authorization. This implies protection against spoofing and elevation of privilege. |||| 285 |
| **4.1.4** | [DELETED, DUPLICATE OF 4.1.3] | | | | |
| **4.1.5** | [GRAMMAR] Verify that access controls fail securely by denying access, including when an exception occurs. |||| 285 |
| **4.1.6** | [ADDED] Verify that changes to values on which access control decisions are made, are applied immediately. Where changes cannot be applied immediately, (such as when relying on data in cryptographically secured tokens), there must be mitigating controls to alert when a user performs an action when they should no longer be able to do so, and revert the change. Note that this would be unable to mitigate information leakage. | ||| |

## V4.2 Operation Level Access Control

Expand Down

0 comments on commit a46bb04

Please sign in to comment.