For each OWASP item: a) prevent with code/config, b) detect with tests & runtime sensors, c) respond with incident playbook. Example: Broken Access Control → automated access tests + runtime RBAC auditing logs.
MTTD
Target: < 24h
MTTR
Target: < 72h
Coverage
SAST/DAST ≥ 90%
Authentication & Authorization
Make auth friction smart: protect account recovery, rotate keys, require MFA on sensitive paths.
Auth
Design & controls
Use strong hashing for passwords (Argon2id preferred; bcrypt or scrypt acceptable). Use per-user salt, memory-hard params tuned for latency & cost.
Prefer short-lived access tokens + refresh with rotation. Use refresh token rotation pattern to detect theft.
Implement MFA (TOTP + push + FIDO2) for all privileged operations and admins.
Enforce account lockout/backoff & notify on suspicious resets.
Start in report-only mode to gather violations: use report-uri/report-to. Then iterate to enforcement. Consider nonce-or-hash approach for necessary inline scripts.
Checklist
Storage & Data Protection
Encrypt sensitive data at rest & in transit. Apply field-level encryption for PII, and protect keys with KMS/HSM and rotation policies.
Key management
Use managed KMS with strong IAM policies and least privilege. Rotate keys quarterly or per policy.
Never store raw credentials or secrets in code or plain text. Use secret managers & ephemeral credentials (IAM roles).
Data minimization & retention
Collect only required data; apply retention policies and automated deletion; use pseudonymization when possible.
Checklist
Dependencies & Supply-Chain Security
Treat third-party code as high-risk: scan, pin, validate, and sign artifacts. Use reproducible builds and minimal dependencies.
Practical steps
Automated SBOM generation and dependency scanning (Snyk, OSS Index, etc.). Block critical vulnerabilities in CI/CD gates.
Pin dependencies and prefer lockfiles. Set up alerts for transitive dependency issues.
Sign artifacts (container images, packages) and verify signatures in production image policies.
Checklist
CI/CD & Testing
Shift left: run SAST, dependency checks, secrets scanning, and SBOM generation in CI. Use reproducible pipelines and least-privileged runners.
Pipeline controls
Fail builds on high severity findings. Provide auto-PR remediations for low/mid severity where safe.
Isolate build environments and rotate service tokens between stages. Use ephemeral runners to reduce exposure.
Automate infrastructure scanning (IaC checks) and enforce secure baseline images.
Checklist
Logging, Monitoring & Incident Response
Design logging for detection and forensics. Centralize logs, ensure immutability/retention, and run playbook drills.
Monitoring essentials
Log auth decisions, critical errors, and policy violations. Telemetry must include request IDs and user context for traceability.
Build alerts on anomalous patterns (credential stuffing, sudden traffic to admin endpoints, spikes in 401/403).
Run tabletop exercises and automate IR steps where possible: isolate container, rotate keys, revoke sessions.
Checklist
Master Checklist (Exportable)
All required items collated. Use export to CSV to integrate with trackers.
Quick Quiz — Test your basics
Select the best answer and submit. Instant feedback.