CDP 35948516: NodeJS #30
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948516Category: Secure Application Development
Frequency: Onetime
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Secure Application Development Requirement: Complete the Accenture Delivery Methods (ADM) and CDP requirements for NodeJS by implementing the security requirements listed in the Secure Coding Checklist in your solution. Validation of this control is attestation to the implementation of all requirements in the secure coding checklist. https://in.accenture.com/protectingaccenture/client-data-protection/secure-coding-checklists/ Guidance: Visit the Secure Coding Checklist page and download the corresponding checklist. Share the list with all applicable project resources and instruct on the implementation of requirements in the solution. In case you are unable to implement a security requirement discuss with your Account Manager to assist in processing a formal exception with client sign-off. The checklists are to be used for tracking purposes. For more information visit the Secure Application Development website. Solution security is required by Policy 56.
CapaKraken Action Plan — 35948516 NodeJS Secure Coding Checklist
Checklisten-Quelle: Secure Coding_NodeJS.xlsx
Aktueller Stand:
Dockerfile.prodTypische NodeJS-Checkliste-Items:
eval()/Function()Konstruktoren im Server-Codechild_process.execnur mit statischen Strings — kein User-Inputpath.join()+ Whitelist (realpath-Check)JSON.parsenur auf Zod-validated Input (bereits OK)Object.create(null)für Maps, Zod validiert Keys)package.json—engines.nodelockt Version (Dockerfile.prodsetzt 20)Todos:
eval\(,new Function\(,child_process.exec— sollte keine Treffer produzierensamples/CDP/attestations/nodejs.pdfCapaKraken Compliance-Status
EAPPS-Mapping:
Node.js SecurityStatus: 🟡 PARTIAL / TODO — konkrete Schritte unten
Zusammenfassung
Next.js Runtime + API-Package basieren auf Node 20. Die 4 Node.js-Checks laufen über Checkliste #34.
Aktuelle Evidenz
Dockerfile.prod(FROM node:20-bookworm-slim)Dockerfile.prodZeile ~87Offene Aufgaben
Helmet-Äquivalent? (Next.js setzt eigene Security-Headers via next.config.ts — ähnlich Helmet).rate-limit.ts— Äquivalent zurate-limiter-flexible).Ticket bleibt offen bis alle Aufgaben abgehakt sind.
Abschluss
Alle 4 Node.js-spezifischen Security-Checks aus Checkliste #34 sind nachweislich umgesetzt (siehe #34).
Ergänzende Evidenz:
nextjs(uid=1001) —Dockerfile.prod:87packages/api/src/middleware/rate-limit.tsnext.config.ts(HSTS, CSP, X-Frame-Options, Referrer-Policy, Permissions-Policy)auth.config.tsTicket wird geschlossen.