18F / frontend

18F's Front End Guild –  content has been moved to https://github.com/18F/development-guide
Other
122 stars 29 forks source link

Add a security section to the front-end guide #172

Closed toolness closed 6 years ago

toolness commented 7 years ago

As mentioned in #158, we should have section on front-end security!

Topics can include:

Some forms of exploit mitigation are collaborations between front and back-end. For example:

So I'm not sure whether these things should go in the front-end guide vs. some kind of back-end/security guide, or both.

konklone commented 7 years ago

I'd love to see something included about avoiding unnecessary use of third parties (e.g. self-hosting Google Fonts instead of linking to them by reference, not using code.jquery.com or ajax.googleapis.com, etc.).

hbillings commented 7 years ago

It sounds like this originally came up in relation to ATO pentesting. We're going to chat more about this in the rally on Friday. It would be helpful if we could chat with folks who have been through this process and see what kinds of issues have come up.

@toolness, I think what you've outlined here is valuable regardless of what else comes up in the rally, particularly things like CORS and sanitizing data. Explicit guidance would be better than implicit, to mangle a Zen of Python saying. :)

toolness commented 7 years ago

Cool! Part of what I wrote was also a reflection of issues that came up during CALC's ATO pentesting, if that helps, though @jseppi might have additional feedback.

jseppi commented 7 years ago

I think @toolness covered what came up in CALC's pentesting.

One of the findings was that direct user input was shown on the page in a way that could make the site look broken. It wasn't really a security problem, but a presentation/trust problem, especially given that the bad input was read from a URL query param.

The pentesters also found that some user input would cause the page (and perhaps even the browser) to crash. This was due to a code bug that resulted in an infinite loop. Again, not really a security problem, but something like that could have hurt the site's reputation or have been used to maliciously crash a link recipient's browser.

CALC did have an XSS bug, but we luckily caught it before the pentesters, fixed it in our legacy jquery code, and then totally mitigated similar problems by switching to React.

msecret commented 7 years ago

After discussion, we decided to keep the focus of the guide on the mitigation strategies rather the then threats. Mitigation will be how the guide is organized. Threats will be part of each mitigation strategy section. We also decided that finding existing documentation on the internet should be done first, and just link to it, rather then write more guidance. In accessing whether the existing documentation is good enough, we decided it has to be practical advice for teams to actually implement the mitigation strategies

Created the following issues to split up the work:

msecret commented 7 years ago

This could have some useful content: https://simplesecurity.sensedeep.com/web-developer-security-checklist-f2e4f43c9c56

xtine commented 6 years ago

We have a Security page in place. Closing this issue in favor of new issues to target addition or changes to existing sections under the Security page.