TimeSheets Threat Report
TimeSheets Threat Report
Threat Report
T Gopi
06 June 2024
Purpose of this Report:
http protocol.
content.
Data Flow
Request is generated from the client via the Internet. The request
arrives at the TimeSheets web server which serves static content
to the user (HTML, images, etc). Dynamic data is retrieved from
the database and served to the client.
Completed Architecture Audit
Flaws
Internet
Completed Threat Model
Internal User
During the threat model the SRE team confirmed that the
database is on a server that does not have encryption at rest.
During the threat model the DBA team confirmed that the
database is storing authentication data (credentials) encrypted.
Risk Score
(1 is most dangerous, 4 is least dangerous)
Unencrypted at Rest 4
Reversible Encryption 2
Unencrypted in 1
Transit
Outdated Algorithm 3
Salt the Hashes: Use a unique salt for each password before
hashing it. This ensures that identical passwords have different
hashes, preventing precomputed attacks like rainbow tables.
We have to use AES NIST approvied algorithm like AES 128, 192
and 256.