Skip to content

Commit

Permalink
BREACH is likely a False Positive
Browse files Browse the repository at this point in the history
  • Loading branch information
pburkholder committed Feb 3, 2025
1 parent 08726fe commit 3835ce9
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions _docs/compliance/domain-standards.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,8 +67,9 @@ according to the [BREACH authors](https://breachattack.com), including the follo

Since any modern web application framework should include CSRF token masking to mitigate BREACH,
disabling compression is not necessary, and would badly impact all end users of cloud.gov. We
suggest that you mitigate BREACH at the application level, or carry the finding as an operational
requirement.
suggest that you mitigate BREACH at the application level, and if the application-level mitigations
are in place, denote the scanner finding as a false positive.


## DNSSEC

Expand Down

0 comments on commit 3835ce9

Please sign in to comment.