ASVS Requirement 15.2.5
- Level: 3
- Chapter: V15 Secure Coding and Architecture
- Section: V15.2 Security Architecture and Dependencies
- Source: 0x24-V15-Secure-Coding-and-Architecture.md
Description
Verify that the application implements additional protections around parts of the application which are documented as containing "dangerous functionality" or using third-party libraries considered to be "risky components". This could include techniques such as sandboxing, encapsulation, containerization or network level isolation to delay and deter attackers who compromise one part of an application from pivoting elsewhere in the application.