diff options
author | vjeantet <valere.jeantet@gmail.com> | 2020-11-06 01:30:56 +0300 |
---|---|---|
committer | vjeantet <valere.jeantet@gmail.com> | 2020-11-06 01:30:56 +0300 |
commit | b43c043a7b9153e5cf6a1a30b057d143b1cedc52 (patch) | |
tree | 468fe0ce643f24e92c0ed06e6dc587eb52a62c13 /exampleSite/content/checklist/webappsec/05_commonvuln_UseofCryptography.md | |
parent | 4b0cf57d5be417ddb3167d0bd0b4c09a35c1e62b (diff) |
Diffstat (limited to 'exampleSite/content/checklist/webappsec/05_commonvuln_UseofCryptography.md')
-rw-r--r-- | exampleSite/content/checklist/webappsec/05_commonvuln_UseofCryptography.md | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/exampleSite/content/checklist/webappsec/05_commonvuln_UseofCryptography.md b/exampleSite/content/checklist/webappsec/05_commonvuln_UseofCryptography.md deleted file mode 100644 index ee42846..0000000 --- a/exampleSite/content/checklist/webappsec/05_commonvuln_UseofCryptography.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -hidden: true -ignoresearch: true ---- - - -You previously mentioned that your application uses cryptography to ensure the confidentiality and/or integrity of information. That's great! But we want to make sure you're using cryptography correctly. - -Note: when using cryptography, make sure algorithms are used in the right context and within appropriate constraints. For example, encrypting a session ID does not prevent an attacker from manipulating it. Similarly, a signature does not protect a message's confidentiality. - -**Describe your use of cryptography (what information is encrypted/signed, how, why, what algorithms are used, etc.). Be as specific and precise as possible:** -{{<c/text "webvuln_crypto_details" multi />}} |