The application will employ all standard and reasonable mechanisms to protect against known exploits against data driven Web applications. These mechanisms include
Parameter Binding
All database interfaces will use strongly typed bound parameters for all database transactions that require variable input.
SQL statements dynamically created from text strings received as user input will never be employed under any circumstances
Strong Passwords
Passwords will be:
case-sensitive
8 chars minimum
Contain mixed case and number
not reusable
salted and hashed before being written to DB
SSL Encryption
All traffic to the application will be encrypted using SSL.
The application will not respond to any requests over plain HTTP
File System
All application configurations will be maintained in files unavailable to end users but accessible to the web pages that rely on them.
File system permissions and any related HTTP server configurations will be used to restrict access to only the appropriate content
Directory listings will be disabled.
Data Privacy
Access to personal information should not be available to system users unless it is required to perform their tasks.
The system shall restrict access to personal data through the use of System Roles
Group coordinators/leaders shall only see the personal data of people in the groups that have access to.
Membership Coordinators can see the personal data of anyone in the system
Inventory Coordinators can see the personal data of anyone in the system