-
Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
Overview
Syllabus
-
Introduction
- Prevent common software vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Laws and regulations
- Reducing scope
- Encryption (TLS and HSTS)
- General concept
- Example scenario 1
- Example scenario 2
- Disable XXE processing
- Whitelisting and validating input
- Upgrade all XML processors and libraries
- Next steps