Skip to content

Instantly share code, notes, and snippets.

@deepfriedheroin
Forked from al3rez/SecurityChecklist.md
Created March 28, 2025 04:08
Show Gist options
  • Select an option

  • Save deepfriedheroin/b51bcec7988e9ece7a01133971ab7598 to your computer and use it in GitHub Desktop.

Select an option

Save deepfriedheroin/b51bcec7988e9ece7a01133971ab7598 to your computer and use it in GitHub Desktop.

Revisions

  1. @al3rez al3rez revised this gist Mar 27, 2025. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion SecurityChecklist.md
    Original file line number Diff line number Diff line change
    @@ -1,4 +1,4 @@
    # Security Checklist (AI-Assisted in CursorAI)
    # Security Checklist (What can be done in CursorAI & software-level not infrastructure!)

    ## Configuration Security
    - [x] Detect secrets in code
  2. @al3rez al3rez revised this gist Mar 27, 2025. 1 changed file with 23 additions and 36 deletions.
    59 changes: 23 additions & 36 deletions SecurityChecklist.md
    Original file line number Diff line number Diff line change
    @@ -1,52 +1,39 @@
    # Security Checklist (Software-Level Focus)
    # Security Checklist (AI-Assisted in CursorAI)

    ## Configuration Security
    - [x] Store secrets in environment variables or dedicated secret management systems
    - [x] Never commit secrets to version control
    - [x] Implement secret rotation policies
    - [x] Use different credentials for different environments
    - [x] Encrypt sensitive configuration values
    - [x] Detect secrets in code
    - [x] Identify secrets committed to version control
    - [x] Flag hardcoded credentials

    ## Authentication & Authorization
    - [x] Implement proper authentication mechanisms
    - [x] Use OAuth 2.0 or OpenID Connect where appropriate
    - [x] Implement role-based access control (RBAC)
    - [x] Follow the principle of least privilege
    - [x] Identify missing authentication checks
    - [x] Detect improper authorization patterns
    - [x] Flag violations of principle of least privilege

    ## Data Protection
    - [x] Encrypt data at rest
    - [x] Encrypt data in transit (TLS/HTTPS)
    - [x] Implement proper key management
    - [x] Sanitize and validate all inputs
    - [x] Implement output encoding to prevent XSS attacks
    - [x] Apply proper database security controls
    - [x] Identify unencrypted sensitive data
    - [x] Detect missing input validation
    - [x] Find XSS vulnerabilities through missing output encoding
    - [x] Identify SQL injection vulnerabilities

    ## API Security
    - [x] Implement rate limiting
    - [x] Set appropriate timeouts
    - [x] Use API keys/tokens with proper scopes
    - [x] Validate and sanitize all API inputs
    - [x] Implement proper error handling that doesn't leak sensitive information
    - [x] Detect missing rate limiting
    - [x] Identify improper error handling that leaks information
    - [x] Find missing input validation in API endpoints

    ## Logging & Monitoring
    - [x] Implement security event logging
    - [x] Configure alerts for suspicious activities
    - [x] Implement audit trails for sensitive operations
    - [x] Ensure logs don't contain sensitive information
    - [x] Identify sensitive information in logs
    - [x] Detect missing error logging

    ## Dependency Management
    - [x] Regularly scan dependencies for vulnerabilities
    - [x] Implement a process for updating vulnerable dependencies
    - [x] Use dependency lockfiles for deterministic builds
    - [x] Minimize dependency footprint
    - [x] Flag outdated dependencies with known vulnerabilities
    - [x] Identify excessive dependencies that increase attack surface

    ## Resilience & Availability
    - [x] Implement proper error handling
    - [x] Design for graceful degradation
    - [x] Protect against DoS attacks
    - [x] Implement circuit breakers for external services
    - [x] Detect missing error handling
    - [x] Identify potential DoS vulnerabilities
    - [x] Find missing timeout configurations

    ## SDLC Security
    - [x] Perform regular security testing (SAST, DAST, IAST)
    - [x] Maintain a vulnerability management program
    - [x] Implement proper CI/CD security controls
    - [x] Identify common security issues through static analysis
    - [x] Suggest security improvements in code reviews
  3. @al3rez al3rez revised this gist Mar 27, 2025. 1 changed file with 36 additions and 56 deletions.
    92 changes: 36 additions & 56 deletions SecurityChecklist.md
    Original file line number Diff line number Diff line change
    @@ -1,72 +1,52 @@
    # Security Checklist
    # Security Checklist (Software-Level Focus)

    ## Configuration Security
    - [ ] Store secrets in environment variables or dedicated secret management systems
    - [ ] Never commit secrets to version control
    - [ ] Implement secret rotation policies
    - [ ] Use different credentials for different environments
    - [ ] Encrypt sensitive configuration values
    - [x] Store secrets in environment variables or dedicated secret management systems
    - [x] Never commit secrets to version control
    - [x] Implement secret rotation policies
    - [x] Use different credentials for different environments
    - [x] Encrypt sensitive configuration values

    ## Authentication & Authorization
    - [ ] Implement proper authentication mechanisms
    - [ ] Use OAuth 2.0 or OpenID Connect where appropriate
    - [ ] Implement role-based access control (RBAC)
    - [ ] Follow the principle of least privilege
    - [ ] Implement multi-factor authentication (MFA) for sensitive operations
    - [x] Implement proper authentication mechanisms
    - [x] Use OAuth 2.0 or OpenID Connect where appropriate
    - [x] Implement role-based access control (RBAC)
    - [x] Follow the principle of least privilege

    ## Data Protection
    - [ ] Encrypt data at rest
    - [ ] Encrypt data in transit (TLS/HTTPS)
    - [ ] Implement proper key management
    - [ ] Sanitize and validate all inputs
    - [ ] Implement output encoding to prevent XSS attacks
    - [ ] Apply proper database security controls
    - [x] Encrypt data at rest
    - [x] Encrypt data in transit (TLS/HTTPS)
    - [x] Implement proper key management
    - [x] Sanitize and validate all inputs
    - [x] Implement output encoding to prevent XSS attacks
    - [x] Apply proper database security controls

    ## API Security
    - [ ] Implement rate limiting
    - [ ] Set appropriate timeouts
    - [ ] Use API keys/tokens with proper scopes
    - [ ] Validate and sanitize all API inputs
    - [ ] Implement proper error handling that doesn't leak sensitive information

    ## Infrastructure Security
    - [ ] Use container security scanning
    - [ ] Implement network segmentation
    - [ ] Apply security hardening to containers and hosts
    - [ ] Use Web Application Firewalls (WAF) where appropriate
    - [ ] Implement proper egress filtering
    - [x] Implement rate limiting
    - [x] Set appropriate timeouts
    - [x] Use API keys/tokens with proper scopes
    - [x] Validate and sanitize all API inputs
    - [x] Implement proper error handling that doesn't leak sensitive information

    ## Logging & Monitoring
    - [ ] Implement security event logging
    - [ ] Use centralized log collection and analysis
    - [ ] Configure alerts for suspicious activities
    - [ ] Implement audit trails for sensitive operations
    - [ ] Ensure logs don't contain sensitive information
    - [x] Implement security event logging
    - [x] Configure alerts for suspicious activities
    - [x] Implement audit trails for sensitive operations
    - [x] Ensure logs don't contain sensitive information

    ## Dependency Management
    - [ ] Regularly scan dependencies for vulnerabilities
    - [ ] Implement a process for updating vulnerable dependencies
    - [ ] Use dependency lockfiles for deterministic builds
    - [ ] Vet third-party libraries before inclusion
    - [ ] Minimize dependency footprint
    - [x] Regularly scan dependencies for vulnerabilities
    - [x] Implement a process for updating vulnerable dependencies
    - [x] Use dependency lockfiles for deterministic builds
    - [x] Minimize dependency footprint

    ## Resilience & Availability
    - [ ] Implement proper error handling
    - [ ] Design for graceful degradation
    - [ ] Protect against DoS attacks
    - [ ] Implement circuit breakers for external services
    - [ ] Have a tested disaster recovery plan
    - [x] Implement proper error handling
    - [x] Design for graceful degradation
    - [x] Protect against DoS attacks
    - [x] Implement circuit breakers for external services

    ## SDLC Security
    - [ ] Perform regular security testing (SAST, DAST, IAST)
    - [ ] Implement secure code review processes
    - [ ] Conduct regular penetration testing
    - [ ] Maintain a vulnerability management program
    - [ ] Implement proper CI/CD security controls

    ## Compliance & Governance
    - [ ] Document security controls
    - [ ] Implement proper data retention policies
    - [ ] Ensure compliance with relevant regulations (GDPR, HIPAA, etc.)
    - [ ] Conduct regular security awareness training
    - [ ] Establish incident response procedures
    - [x] Perform regular security testing (SAST, DAST, IAST)
    - [x] Maintain a vulnerability management program
    - [x] Implement proper CI/CD security controls
  4. @al3rez al3rez created this gist Mar 26, 2025.
    72 changes: 72 additions & 0 deletions SecurityChecklist.md
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,72 @@
    # Security Checklist

    ## Configuration Security
    - [ ] Store secrets in environment variables or dedicated secret management systems
    - [ ] Never commit secrets to version control
    - [ ] Implement secret rotation policies
    - [ ] Use different credentials for different environments
    - [ ] Encrypt sensitive configuration values

    ## Authentication & Authorization
    - [ ] Implement proper authentication mechanisms
    - [ ] Use OAuth 2.0 or OpenID Connect where appropriate
    - [ ] Implement role-based access control (RBAC)
    - [ ] Follow the principle of least privilege
    - [ ] Implement multi-factor authentication (MFA) for sensitive operations

    ## Data Protection
    - [ ] Encrypt data at rest
    - [ ] Encrypt data in transit (TLS/HTTPS)
    - [ ] Implement proper key management
    - [ ] Sanitize and validate all inputs
    - [ ] Implement output encoding to prevent XSS attacks
    - [ ] Apply proper database security controls

    ## API Security
    - [ ] Implement rate limiting
    - [ ] Set appropriate timeouts
    - [ ] Use API keys/tokens with proper scopes
    - [ ] Validate and sanitize all API inputs
    - [ ] Implement proper error handling that doesn't leak sensitive information

    ## Infrastructure Security
    - [ ] Use container security scanning
    - [ ] Implement network segmentation
    - [ ] Apply security hardening to containers and hosts
    - [ ] Use Web Application Firewalls (WAF) where appropriate
    - [ ] Implement proper egress filtering

    ## Logging & Monitoring
    - [ ] Implement security event logging
    - [ ] Use centralized log collection and analysis
    - [ ] Configure alerts for suspicious activities
    - [ ] Implement audit trails for sensitive operations
    - [ ] Ensure logs don't contain sensitive information

    ## Dependency Management
    - [ ] Regularly scan dependencies for vulnerabilities
    - [ ] Implement a process for updating vulnerable dependencies
    - [ ] Use dependency lockfiles for deterministic builds
    - [ ] Vet third-party libraries before inclusion
    - [ ] Minimize dependency footprint

    ## Resilience & Availability
    - [ ] Implement proper error handling
    - [ ] Design for graceful degradation
    - [ ] Protect against DoS attacks
    - [ ] Implement circuit breakers for external services
    - [ ] Have a tested disaster recovery plan

    ## SDLC Security
    - [ ] Perform regular security testing (SAST, DAST, IAST)
    - [ ] Implement secure code review processes
    - [ ] Conduct regular penetration testing
    - [ ] Maintain a vulnerability management program
    - [ ] Implement proper CI/CD security controls

    ## Compliance & Governance
    - [ ] Document security controls
    - [ ] Implement proper data retention policies
    - [ ] Ensure compliance with relevant regulations (GDPR, HIPAA, etc.)
    - [ ] Conduct regular security awareness training
    - [ ] Establish incident response procedures