From the course: Practical Secure by Design: Threat Modeling to Build Resilient Products

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Insecure implementation: Handling failures the wrong way

Insecure implementation: Handling failures the wrong way

- [Instructor] Funny enough, this video will give you a good recap of the previous four chapters. If you haven't watched any of the previous four chapters, now is an opportunity to pause and go back and watch them. In the context of secure defaults, if you remember, we tried to access the checkout API and we were able to see the credit card information in plain text. Let me remind you, I'm going to simply call the payments endpoint this time, and as you can see in this scenario, when I call the payments endpoint without any authentication, it gives me the credit card information in plain text. It also gives me other PII. In the context of minimizing attacks off this, we talked a little bit about debug mode being enabled and exposed in production. In the context of principle of least privilege, we noticed how a low privilege user had access to all the order details because access controls were not implemented. In our…

Contents