Close unused resources
Summary
The source code must implement mechanisms to ensure the closure of any unused open resources.
Description
empty
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References
- CWE™-404. Improper resource shutdown or release
- OWASP TOP 10-A6. Vulnerable and outdated components
- Agile Alliance-9. Continuous attention to technical excellence and good design
- MITRE ATT&CK®-M1013. Application developer guidance
- MITRE ATT&CK®-M1035. Limit access to resource over network
- CMMC-AT_L2-3_2_1. Role-based risk awareness
- CMMC-CM_L2-3_4_7. Nonessential functionality
- OSSTMM3-11_9_3. Data networks security - Limitations mapping
- ISSAF-U_15. Web application SQL injections – Countermeasures
- OWASP SCP-10. System configuration
- OWASP SCP-11. Database security
- OWASP SCP-13. Memory management
- SIG Core-I_3_2_5. Application security
- SIG Core-M_1_2. End user device security
- SIG Core-U_1_2_1. Server security
Vulnerabilities
- 391. Inappropriate coding practices - Unused properties
- 423. Inappropriate coding practices - System exit
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.