Web application security: Difference between revisions
No edit summary |
|||
Line 12: | Line 12: | ||
== TLS == | == TLS == | ||
Use TLS (yes TLS, not SSL), at least v1.2. | Use TLS (yes TLS, not SSL), at least v1.2. Every inbound and outbound (to APIs, databases etc.) request should go over a secure connection (you can get away without TLS for your database connections if you are using the same host and a dedicated server, but this is still not ideal). | ||
== Peppers == | == Peppers == |
Revision as of 15:58, 8 April 2023
Definitions
Know the difference between:
- Encryption / Decryption
- Encoding / Decoding
- Hashing
- Message authentication
There are some overlaps and sometimes the terms are used interchangeably, but ultimately they are different tools for different use cases (e.g. don't use a hash if you need to retrieve the original input).
TLS
Use TLS (yes TLS, not SSL), at least v1.2. Every inbound and outbound (to APIs, databases etc.) request should go over a secure connection (you can get away without TLS for your database connections if you are using the same host and a dedicated server, but this is still not ideal).
Peppers
Like salts, but global to the application (and only known to the application, not the database). Don't bother with these, because:
- They provide limited extra 'security'
- You can't easily rotate the pepper as it is effectively embedded in password hashes etc.
If your passwords are salted, a pepper adds very little and causes extra maintenance and the problem of rotating keys. Also, on the vast majority of web applications - especially small ones - the application and database are on the same server anyway.