You are on page 1of 1

All security controls will be validated once complete system is ready for security

evaluation.

15. Elastic Search is being used to avoid SQL Injection.


17. Session mgmt. is required in order to avoid session hijacking/ Broken
authentication.
18 Objects are not allowed to be accessed without authorization.
19. Elastic Search is being used to avoid cross site request forgery.
20. Secure Cryptographic storage is implemented
22. Redirects are forwarding’s are validated properly

You might also like