Site icon TAAGUNG

SOUND – S for Secure Programming #3 | OWASP #3 | Sensitive Data Exposure

As part of Secure programming under SOUND Programming Methodology, we will explore 3rd security threat Sensitive Data Exposure. Before that, we have already covered

What is Sensitive Data Exposure?

This occurs when our application doesn’t protect the used sensitive data.

These below items can be classified as Sensitive data –

Scenario and Preventions for Sensitive Data Exposure

Scenario #1 – Transmission over unsecured channel
Prevention –
Scenario #2 – Unsecured Storage
Prevention –
Scenario #3 – Weak Encryption and old algorithms
Prevention –
Scenario #4 – Saving of unnecessary data
Prevention –
Scenario #6 – Insufficient control and improper classification of data
Prevention –

With this introduction, I hope you got a very good overview of OWASP Threat #3, Sensitive Data Exposure and will take care in your code and code review. It may NOT be applicable to all applications but recommended to consider with Banking and Finance, Healthcare and Insurance related applications.

Exit mobile version