OWASP / Top10

Official OWASP Top 10 Document Repository
Other
4.24k stars 824 forks source link

Clarifying A04:2021 – Insecure Design "key flows" #655

Closed websec119 closed 2 years ago

websec119 commented 2 years ago

A04:2021 – Insecure Design

How to Prevent 3rd item Use threat modeling for critical authentication, access control, business logic, and key flows

In this explanation, which do you mean by "key flows".

jmanico commented 2 years ago

I would use "key lifecycle. Cryptographic operations seems ok as is. Just my 2 cents.