- Authentication cookies are protected in transit by using SSL
- The contents of authentication cookies are encrypted.
- A session timeout has been factored in the design of the application
- Session ids generated for tracking sessions should not be guessable numbers (e.g.. First user who visits the site gets session no. 1, the second user gets 2 and so on.)
- Session ids are not reused for a long cycle.
- Design supports an elaborate mitigation for session hijacking attacks.
- Use one session token with two values during authentication. One value before authentication and one after.
- The system does not rely too much on persistent cookies
- Guards are present for confidentiality and integrity of cookies.
- Are sensitive cookies marked as "secure"
- Does the application rely on IP filtering for security?
Friday, October 27, 2006
Security considerations for session management in applications
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment