Skip to content

Commit db4ff57

Browse files
authored
Update 0xa3-excessive-data-exposure.md
We can't ask developers to define and enforce all data returned by all API methods. It's like asking "Implement input validation on every single input on the system" - for many companies it won't be a feasible solution. As security engineers who provide recommendations for the broad community, we should always keep in mind the trade off between security and the available resources of the company that uses OWASP to improve the security posture.We should always assume that companies have limited resources. With this mindset, OWASP has been provided recommendations for many years. Recommendations like "Explicitly define and enforce data returned by all API methods including errors: give all JSON objects schemas, all string objects patterns, use clear field names." don't align with this mindset. The second part of the last recommendation already appears in the second recommendation.
1 parent 6f5a987 commit db4ff57

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

2019/en/src/0xa3-excessive-data-exposure.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,12 +42,11 @@ the site.
4242
* Never rely on the client side to perform sensitive data filtering.
4343
* Review the responses from the API to make sure they contain only legitimate
4444
data.
45-
* Explicitly define and enforce data returned by all API methods, including
46-
errors. Whenever possible: use schemas for responses, patterns for all strings
47-
and clear field names.
48-
* Define all sensitive and personally identifiable information (PII) that your
49-
application stores and works with and review all API calls returning such
50-
information to see if these responses can be a security issue.
45+
* Use generis methods like "to_json" and "to_string" from the ORM / Model level
46+
carefully. Backend engineers should always ask themselves "who is the consumer
47+
of the returned data?"
48+
* Classify sensitive and personally identifiable information (PII) that your
49+
application stores and works.
5150

5251
## References
5352

0 commit comments

Comments
 (0)