Clarify how TLS works and when sensitive information in URIs should not be used#277
Clarify how TLS works and when sensitive information in URIs should not be used#277diderikvw wants to merge 10 commits intoLogius-standaarden:developfrom
Conversation
|
@TimvdLippe Te overwegen om ook als noot toe te voegen: bij TLS worden het URL-pad en de query strings ook versleuteld, dus elke tussenliggend component kan eventuele gevoelige gegevens hierin niet zien en niet loggen. Met name een relevante kanttekening bij system-to-system-integraties. |
|
@diderikvw Kun je deze PR updaten met jouw voorstel? Dat kunnen we dat voorleggen aan de TO-leden om te kijken wat ze daarvan denken. |
|
@TimvdLippe Ja, heb ik gedaan. Hoe ik TLS begrijp, klopt dit gedeelte niet:
Daarom heb ik de tekst wat rigoreuzer aangepast. |
|
Thanks voor de cleanup! |
TimvdLippe
left a comment
There was a problem hiding this comment.
Wat kleine tekstuele nits. De HTML heb ik zelf niet getest, maar zou gewoon moeten werken.
Co-authored-by: Tim van der Lippe <TimvdLippe@users.noreply.github.com>
|
@TimvdLippe wil jij deze mergen? ter info: we hebben het issue en pr besproken in de werkgroep beveiliging en vinden dat de wijziging een verbetering is ten opzichte van de huidige tekst. |
|
@mrtn78 Dit betreft een wijziging op de standaard, dus zal bij het volgende TO worden besproken. Ah dit is een PR van een fork, waar we de preview niet van kunnen pushen naar onze repository. Ik weet dus niet 100% of hij goed rendert. Ik zal daar tijdelijk een aparte PR voor maken zodat we de preview kunnen zien: #293 |
|
Besproken met werkgroep, akkoord om te mergen met wijzigingen van Tim erbij. Ik zoek uit hoe dit moet (optie voor mij als Admin nu niet aanwezig? |
| <li>whenever the TLS protocol is terminated and newly initiated in between | ||
| </ul> | ||
| <p>For REST API's that are accessed directly from user devices, like web browsers, do not put client secrets used for authentication and other sensitive information in the URI. These are directly visible to users, are stored in the web browser's history and cache and can be bookmarked and sent to others. | ||
| <p>For REST API's that are only used for system-to-system interation on closed networks where all systems are under control of the involved client and server organisations, do not put client secrets used for authentication in the URI and be careful to put sensitive information in the URI. Intermediate network components that terminate and newly initiate TLS could log or otherwise store URIs. Consider the consequences, advantages and disadvantages of using sensitive information in the URI and be deliberate about which information is logged, for which purposes and who has access. |
There was a problem hiding this comment.
For REST API's that are only used for system-to-system interation on closed networks where all systems are under control of the involved client and server organisations, do not put client secrets used for authentication in the URI and be careful to put sensitive information in the URI. Intermediate network components that terminate and newly initiate TLS could log or otherwise store URIs. Consider the consequences, advantages and disadvantages of using sensitive information in the URI and be deliberate about which information is logged, for which purposes and who has access.
| <p>For REST API's that are only used for system-to-system interation on closed networks where all systems are under control of the involved client and server organisations, do not put client secrets used for authentication in the URI and be careful to put sensitive information in the URI. Intermediate network components that terminate and newly initiate TLS could log or otherwise store URIs. Consider the consequences, advantages and disadvantages of using sensitive information in the URI and be deliberate about which information is logged, for which purposes and who has access. | |
| <p>For REST API's that are only used for system-to-system integration on closed networks where all systems are under control of the involved client and server organisations, do not put client secrets used for authentication in the URI and be careful to put sensitive information in the URI. Intermediate network components that terminate and newly initiate TLS could log or otherwise store URIs. Consider the consequences, advantages and disadvantages of using sensitive information in the URI and be deliberate about which information is logged, for which purposes and who has access. |
| <dl> | ||
| <dt>Statement</dt> | ||
| <dd> | ||
| Do not put any sensitive information in URIs |
There was a problem hiding this comment.
suggestie : al op dit niveau de 'uitzondering' aangeven :
Statement
No sensitive information in URIs
In case of REST-API's for system to system communication on a closed network: This rule applies only when there is logging involved in systems that are not under control of the client and server organizations involved in the exchange
| Do not put any sensitive information in URIs | |
| In case of REST-API's for system to system communication on a closed network: This rule applies only when there is logging involved in systems that are not under control of the organizations involved in the exchange |
There was a problem hiding this comment.
Ik begrijp de redenering en op deze manier formuleren is wat mij betreft akkoord, met een kleine aanpassing:
In case of REST-API's for system to system communication on a closed network: This rule applies only when there is logging involved in systems that are not under control of the
client and serverorganizations involved in the exchange
Suggestie voor het weglaten van "client and server", omdat anders de interpretatie kan ontstaan dat het niet geldt voor tussenliggende systemen (netwerkcomponenten) die onder controle staan van de betrokken organisaties.
There was a problem hiding this comment.
Ok, Ik heb dit aangepast in de concrete suggestie bij het statement

Remove BSN as example of sensitive information and add note.