Repudiation Attack

From Guidance Share
Jump to navigationJump to search

Description

The issue of repudiation is concerned with a user denying that he or she performed an action or initiated a transaction. You need defense mechanisms in place to ensure that all user activity can be tracked and recorded.


Vulnerabilities

  • Anonymous access enabled
  • Application using a role-based authorization model
  • Ineffective or lacking logging controls


Countermeasures

  • Disable anonymous access and authenticate every principle
  • Consider using a more granular authorization model in order to produce precise logs at all tiers
  • Log actions to identify a. identity, b. action, c. time, d. component (who, what where, when) while not capturing any sensitive data in logs (e.g., SSN, CC's, passwords, etc.)
  • Enable logging to an object with append-only permissions from the application