Prepare for the seventh and eighth most common vulnerabilities on the 2021 OWASP Top 10 List: identity and authentication failures, and software and data integrity failures.
Overview
Syllabus
Introduction
- OWASP Top 10
- OWASP Top 10 series
- What are identification and authentication failures?
- Example 1: Pwned Passwords
- Example 2: 2021 Verkada data breach
- Prevention technique: Check for weak passwords
- Prevention technique: Use multi-factor authentication
- Prevention technique: Log and limit repeated login attempts
- What are software and data integrity failures?
- Example 1: Solar Winds software supply chain attack
- Example 2: 2021 Codecov bash uploader compromise
- Prevention technique: Use digital signatures
- Prevention technique: Ensure repositories are trustworthy
- Prevention technique: Review code and configuration changes
- OWASP Top 10 keep learning
Taught by
Caroline Wong