View on GitHub

acctp

Academic Cloud Computing Threat Patterns catalog

/ Home / Catalog /

AD01 Broken Authentication

Context Someone interacts with a cloud application
Problem No authentication or broken (weak) authentication by the cloud application
Solution Apply access-token authentication;
Apply password-based authentication;
Apply certificate-based authentication;
Ensure no use of default passwords;
Ensure security of credentials, avoid placement into source code;
Apply credentials rotation policy;
Apply strong passwords policy;
Apply weak-password checks;
Apply failed password delay;
Apply failed password block by host;
Apply multi-factor authentication;
Apply mutual authentication;
Apply social identity authentication;
Apply Single-Sign-On;
References Broken Authentication [OWASP10];
Insufficient Identity, Credential, Access and Key Management [CSA10];
Multi-Factor Authentication, Federation (Single Sign-On), Access Token, Mutual Authentication [Rath];
Type ns:type_ThreatPattern
Victim su:comp_CloudApplication
Aggressor su:comp_CloudApplication;
su:comp_ExternalService;
su:comp_RemoteUser
Aggr. role ns:role_Client
STRIDE ns:STRIDE_Spoofing
Threat ns:threat_txAbuseOfWeakAlgorithm;
ns:threat_txPasswordAttacks;
ns:threat_txUseOfDefaultCredentials

/ Home / Catalog /