Load answers from file:

Web Application Security Questionnaire🔗
Application🔗
Application Metadata🔗

Vulnerability Reporting and Management🔗
Because no system is entirely free of security issues, it's important to provide ways for external users to offer input and report vulnerabilities.
Do you have an easily discoverable way for external researchers to report security vulnerabilities in your systems?
HTTPS and Mixed-Content Risks🔗
Select the option that best describes your web application:
Authentication and Authorization🔗
Basic Information🔗
To get started, tell us a little about your application so we can ask you the right questions.
Common Web Vulnerabilities🔗
Certain features can result in security issues, if used incorrectly. To help us identify potential issues, select the statements that describe your application:
Cross-Site Scripting🔗
Cross-site scripting (or XSS for short) occurs when an application redisplays insufficiently sanitized user input in the context of the application's origin (as defined by the same-origin policy). If the user input contains certain kinds of scripting code, it may read or alter the DOM of the current page when redisplayed. In many cases, XSS is used to steal users' cookies or other application-related data, but it may also be used for phishing attacks, or even to deface the web page. Unfortunately, XSS is one of the most common security issues in web applications, and due to browser quirks and other factors, quite hard to protect against. Select the statements that describe your strategy:

Warning

You didn't select a strategy for protecting against cross-site scripting.

Explain why:
In addition to applying the strategies you've identified, does the application set a valid and appropriate content type and character set for each page (in the Content-Type HTTP header)?
Some XSS vulnerabilities work exclusively on the client side, in an application's scripting code. This kind of XSS is commonly referred to as DOM-based XSS. Because server-side escaping of user input does not protect against DOM-based XSS, you need a strategy for dealing with client-side scripting code that handles user input, as well as parts of the DOM that may contain user input (such as document.location).
Testing, QA, and Monitoring🔗

Security testing can be part of standard application tests. Here are some examples:

  • Simple unit tests: Unit tests are typically used to confirm that the basic building blocks of the application work as expected. Unit tests are easy to repeat — they can run whenever new code is checked into the repository, to confirm that the code still behaves as expected. Unit tests can also check for security features. For example, they can be used to confirm that requests fail without XSRF tokens; that authentication is required to access user data; or that unexpected HTML tags can't get through input filters or escaping routines.
    • Release testing: Before a new version of a product is released, human testers typically go through the application, try the new features, and make sure previous features still work correctly (regression testing). Security testing should be included in this process as well. For example, release testing is a great time to verify that user A cannot access the data of user B.
      • Monitoring: Once the application is deployed, the focus usually shifts from testing to monitoring. Watch out for unexpected spikes in error rates, sandbox violations, and other flaky or inexplicable behavior (including intermittent test failures) — and before you dismiss an anomaly, check with your security team. Crashes and flakiness can indicate a race condition or a memory corruption bug.

      The next few questions assess the testing and monitoring of your application.

Are you using unit tests or similar methods?
Do your engineers and your QA team look for potential security issues during release testing, and have they been trained to do so?
Post-Launch Monitoring🔗
How would you describe your post-launch monitoring?
Additional Notes🔗
Security Contacts🔗

Feedback🔗

Status: No changes
Download Answers Reset Questionnaire