Josh Grossman
Josh Grossman
This requirement is currently as follows. (My emphasis). I had a question come up on this during a training course. [3.3.1](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x12-V3-Session-management.md#v33-session-termination) > Verify that logout and expiration invalidate the session...
CSP is not super easy to implement. Do we definitely believe it should be Level 1? Current requirement: [14.4.3](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x22-V14-Config.md#v144-http-security-headers) > [MODIFIED] Verify that a Content Security Policy (CSP) response header...
| # | Description | | :---: | :--- | | [13.1.4](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x21-V13-API.md#v131-generic-web-service-security) | Verify that authorization decisions are made at both the URI, enforced by programmatic or declarative security at...
This Pull Request relates to issue #1313
Does anyone have a compelling reason why these are not duplicates: [**V5.2.6**](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x13-V5-Validation-Sanitization-Encoding.md#v52-sanitization-and-sandboxing) | Verify that the application protects against SSRF attacks, by validating or sanitizing untrusted data or HTTP file...
Can anyone see why we should not merge these two requirements? | # | Description | | :---: | :--- | | [8.3.1](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x16-V8-Data-Protection.md#v83-sensitive-private-data) | Verify that sensitive data is sent...
I have ready V9 and I think it needs some rework. Overall I think it is trying to distinguish between external facing services and service to service comms and also...
@csfreak92 said he would confirm the ~~CWE~~ NIST mapping for this requirement as discussed here: https://github.com/OWASP/ASVS/pull/1263#issuecomment-1113002285
### Current state: We currently have the following two requirements: [10.3.2](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x18-V10-Malicious.md#v103-application-integrity): > Verify that the application employs integrity protections, such as code signing or subresource integrity. The application must not...