rspec/rules/S5689/recommended.adoc
Loris S a0a00c4cba
Modify S5689: Clarify the rule stakes (#2911)
For review, have a look to our docs:
https://docs.sonarsource.com/sonarqube/9.8/extension-guide/adding-coding-rules/#coding-rule-guidelines

This should not be merged by an AppSec member, because it contains
message information. It should be merged by someone from SonarJS.

---------

Co-authored-by: daniel-teuchert-sonarsource <141642369+daniel-teuchert-sonarsource@users.noreply.github.com>
2023-08-25 19:32:17 +02:00

18 lines
875 B
Plaintext

== Recommended Secure Coding Practices
In general, it is recommended to keep internal technical information within
internal systems to control what attackers know about the underlying
architectures. This is known as the "need to know" principle.
The most effective solution is to remove version information disclosure from
what end users can see, such as the "x-powered-by" header. +
This can be achieved directly through the web application code, server (nginx,
apache) or firewalls.
Disabling the server signature provides additional protection by reducing the
amount of information available to attackers. Note, however, that this does not
provide as much protection as regular updates and patches. +
Security by obscurity is the least foolproof solution of all. It should never
be the only defense mechanism and should always be combined with other security
measures.