Verify Subresource Integrity
Summary
The application must verify the integrity of all externally hosted resources and dependencies using Subresource Integrity (SRI).
Description
Applications often use resources or have dependencies that are hosted on external servers such as a content delivery network (CDN). Applications must validate the integrity of such assets using Subresource Integrity (SRI), in case those systems are compromised.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🟢 |
Advanced | 🟢 |
References
- CAPEC™-148. Content spoofing
- CAPEC™-154. Resource location spoofing
- CAPEC™-165. File manipulation
- CWE™-353. Missing support for integrity check
- CWE™-494. Download of code without integrity check
- OWASP-M TOP 10-M1. Improper platform usage
- NY SHIELD Act-5575_B_6. Personal and private information
- MITRE ATT&CK®-M1035. Limit access to resource over network
- PA-DSS-5_1_5. Secure practices are implemented to verify integrity of source code during the development process
- CMMC-AC_L1-3_1_20. External connections
- HITRUST CSF-01_j. User authentication for external connections
- HITRUST CSF-10_c. Control of internal processing
- OSSTMM3-10_7_4. Telecommunications security (controls verification) - Integrity
- NIST SSDF-PO_1_3. Define security requirements for software development
- NIST SSDF-PS_2_1. Provide a mechanism for verifying software release integrity
- OWASP SCP-14. General coding practices
- SWIFT CSCF-6_2. Software integrity
- SWIFT CSCF-6_3. Database integrity
- OWASP ASVS-10_3_2. Application integrity
- C2M2-9_4_b. Implement software security for cybersecurity architecture
- C2M2-9_4_g. Implement software security for cybersecurity architecture
- PCI DSS-2_2_5. System components are configured and managed securely
- PCI DSS-6_4_3. Public-facing web applications are protected against attacks
- SIG Lite-SL_46. Are background checks performed for Service Provider Contractors and Subcontractors?
- SIG Lite-SL_110. Are there any dependencies on critical third party service providers?
- OWASP ASVS-14_2_3. Dependency
- CASA-1_14_2. Configuration Architecture
- CASA-1_14_3. Configuration Architecture
- CASA-1_14_4. Configuration Architecture
- CASA-10_3_2. Application Integrity
- NIST CSF-ID_AM-04. Inventories of services provided by suppliers are maintained
Vulnerabilities
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.