1.3 KiB
1.3 KiB
Security Practices Reference
Complete technical reference for Grey Haven security standards and practices.
Reference Materials
-
OWASP Top 10 for Grey Haven Stack - Vulnerability prevention
- A01: Broken Access Control
- A02: Cryptographic Failures
- A03: Injection
- A04: Insecure Design
- A05: Security Misconfiguration
- A06: Vulnerable Components
- A07: Authentication Failures
- A08: Data Integrity Failures
- A09: Logging Failures
- A10: Server-Side Request Forgery
-
Security Configuration - Complete settings guide
- Authentication configuration
- Session management
- CORS settings
- Rate limiting config
- Environment variables
-
Secret Management - Doppler integration guide
- Required secrets
- Doppler CLI reference
- Access patterns
- Rotation procedures
-
Multi-Tenant Security - Tenant isolation patterns
- RLS policies
- Query patterns
- Testing strategies
- Common pitfalls
Quick Links
- For examples: See examples/
- For checklists: See checklists/
- For templates: See templates/
Coverage: OWASP Top 10, Configuration, Secrets, Multi-tenancy Last Updated: 2025-11-09