這種標識函數錯誤地處理了機密信息。如果發生以上情況時顯示了敏感信息,程序就會危及用戶的個人隱私。
Privacy Violation 會在以下情況下發生:
1. 用戶私人信息進入了程序。
2. 數據被寫到了一個外部介質,例如控制臺、file system 或網絡。
例 1:輸入 iOS 文本控件的輸入數據存儲在鍵盤緩存中。
//In AppController.h
@property (nonatomic, retain) IBOutlet UITextField *ssnField;
[1] Standards Mapping - OWASP Top 10 2007 - (OWASP 2007) A6 Information Leakage and Improper Error Handling
[2] J. Oates AOL man pleads guilty to selling 92m email addies The Register
[3] Standards Mapping - Security Technical Implementation Guide Version 3 - (STIG 3) APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I
[4] Standards Mapping - Security Technical Implementation Guide Version 3.4 - (STIG 3.4) APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I
[5] California SB-1386 Government of the State of California
[6] Standards Mapping - Common Weakness Enumeration - (CWE) CWE ID 359
[7] Financial Privacy:The Gramm-Leach Bliley Act (GLBA) Federal Trade Commission
[8] Health Insurance Portability and Accountability Act (HIPAA) U.S. Department of Human Services
[9] Standards Mapping - Web Application Security Consortium 24 + 2 - (WASC 24 + 2) Information Leakage
[10] Privacy Initiatives U.S. Federal Trade Commission
[11] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0 - (PCI 2.0) Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.4
[12] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2 - (PCI 1.2) Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.6, Requirement 8.4
[13] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1 - (PCI 1.1) Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 8.4
[14] Safe Harbor Privacy Framework U.S. Department of Commerce
[15] M. Howard, D. LeBlanc Writing Secure Code, Second Edition Microsoft Press