Skip to content

Latest commit

 

History

History
96 lines (63 loc) · 7.04 KB

commonsecuritybestpractices.md

File metadata and controls

96 lines (63 loc) · 7.04 KB

Common Node.js security best practices

The common security guidelines section contains best practices that are standardized in many frameworks and conventions, running an application with ssl/tls for example should be a common guideline and convention followed in every setup to achieve great security benefits.

✔ Use SSL/TLS to encrypt the client-server connection

TL;DR: In the times of free SSL/TLS certificates and easy configuration of those, you do no longer have to weigh advantages and disadvantages of using a secure server because the advantages such as security, support of modern technology and trust clearly outweigh the disadvantages like minimal overhead compared to pure http.

Otherwise: Attackers could perform man-in-the-middle attacks, spy on your users' behaviour and perform even more malicious actions when the connection is unencrypted

🔗 Read More: Running a secure Node.js server



✔ Comparing secret values and hashes securely

TL;DR: When comparing secret values or hashes like HMAC digests, you should use the crypto.timingSafeEqual(a, b) function Node provides out of the box since Node.js v6.6.0. This method compares two given objects and keeps comparing even if data does not match. The default equality comparison methods would simply return after a character mismatch, allowing timing attacks based on the operation length.

Otherwise: Using default equality comparison operators you might expose critical information based on the time taken to compare two objects



✔ Generating random strings using Node.js

TL;DR: Using a custom-built function generating pseudo-random strings for tokens and other security-sensitive use cases might actually not be as random as you think, rendering your application vulnerable to cryptographic attacks. When you have to generate secure random strings, use the crypto.RandomBytes(size, [callback]) function using available entropy provided by the system.

Otherwise: When generating pseudo-random strings without cryptographically secure methods, attackers might predict and reproduce the generated results, rendering your application insecure



Going on, below we've listed some important bits of advice from the OWASP project.

✔ OWASP A2: Broken Authentication

  • Require MFA/2FA for important services and accounts
  • Rotate passwords and access keys frequently, including SSH keys
  • Apply strong password policies, both for ops and in-application user management (🔗 OWASP password recommendation)
  • Do not ship or deploy your application with any default credentials, particularly for admin users or external services you depend on
  • Use only standard authentication methods like OAuth, OpenID, etc.  - avoid basic authentication
  • Auth rate limiting: Disallow more than X login attempts (including password recovery, etc.) in a period of Y
  • On login failure, don't let the user know whether the username or password verification failed, just return a common auth error
  • Consider using a centralized user management system to avoid managing multiple account per employee (e.g. GitHub, AWS, Jenkins, etc) and to benefit from a battle-tested user management system

✔ OWASP A5:  Broken access control

  • Respect the principle of least privilege  -  every component and DevOps person should only have access to the necessary information and resources
  • Never work with the console/root (full-privilege) account except for account management
  • Run all instances/containers on behalf of a role/service account
  • Assign permissions to groups and not to users. This should make permission management easier and more transparent for most cases

✔ OWASP A6: Security Misconfiguration

  • Access to production environment internals is done through the internal network only, use SSH or other ways, but never expose internal services
  • Restrict internal network access  - explicitly set which resource can access other resources (e.g. network policy or subnets)
  • If using cookies, configure it to "secured" mode where it's being sent over SSL only
  • If using cookies, configure it for "same site" only so only requests from same domain will get back the designated cookies
  • If using cookies, prefer "http only" configuration that prevent browser side JavaScript code from accessing the cookies
  • Protect each VPC with strict and restrictive access rules
  • Prioritize threats using any standard security threat modeling like STRIDE or DREAD
  • Protect against DDoS attacks using HTTP(S) and TCP load balancers
  • Perform periodic penetration tests by specialized agencies

✔ OWASP A3: Sensitive Data Exposure

  • Only accept SSL/TLS connections, enforce Strict-Transport-Security using headers
  • Separate the network into segments (i.e. subnets) and ensure each node has the least necessary networking access permissions
  • Group all services/instances that need no internet access and explictly disallow any outgoing connection (a.k.a private subnet)
  • Store all secrets in a vault products like AWS KMS, HashiCorp Vault or Google Cloud KMS
  • Lock down sensitive instance metadata using metadata
  • Encrypt data in transit when it leaves a physical boundary
  • Don't include secrets in log statements
  • Avoid showing plain passwords in the frontend, take necessary measures in the backend and never store sensitive information in plaintext

✔ OWASP A9: Using Components With Known Security Vulneraibilities

  • Scan docker images for known vulnerabilities (using Docker's and other vendors offer scanning services)
  • Enable automatic instance (machine) patching and upgrades to avoid running old OS versions that lack security patches
  • Provide the user with both 'id', 'access' and 'refresh' token so the access token is short-lived and renewed with the refresh token
  • Log and audit each API call to cloud and management services (e.g who deleted the S3 bucket?) using services like AWS CloudTrail
  • Run the security checker of your cloud provider (e.g. AWS security trust advisor)

✔ OWASP A10: Insufficient Logging & Monitoring

  • Alert on remarkable or suspicious auditing events like user login, new user creation, permission change, etc

  • Alert on irregular amount of login failures (or equivelant actions like forgot password)

  • Include the time and username that initiated the update in each DB record

✔ OWASP A7: Cross-Site-Scripting (XSS)

  • Instruct the browser to load resources from the same domain only, using the Content-Security-Policy http header