The system must reuse the database connections.
This requirement is verified in following services
- CIS-16_10. Apply secure design principles in application architectures
- BIZEC-APP-APP-07. Cross-client database access
- ISSAF-H_15_9. Network security - Intrusion detection (rule configuration and management interface)
- ISSAF-T_6_6. Web application assessment - Identifying web server vendor and version (by error)
- OWASP SCP-11. Database security
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.