OWASP Top 10 - M6: Inadequate Privacy Controls

Inadequate Privacy Controls

Privacy controls protect Personally Identifiable Information (PII) like names, addresses, payment details, and sensitive personal data. Attackers exploit PII for fraud, blackmail, or data manipulation, leading to confidentiality, integrity, or availability breaches.

Threats & Risks

  • Attack Vectors: PII is stored in app sandboxes, logs, and network transmissions. Attackers may exploit weak storage, insecure communication, or device backups.
  • Weakness: Many apps collect excessive PII, increasing risk. Poor handling makes it easy for attackers to access.
  • Impact: While technical damage is low, business risks are severe—legal violations (GDPR, CCPA, etc.), lawsuits, reputational harm, and financial losses.

Prevention

  • Minimize PII collection and retention.
  • Avoid storing/transmitting PII unless necessary.
  • Use encryption, secure storage, and authentication.
  • Prevent logging sensitive data or exposing PII in URLs.
  • Secure backups and ensure controlled data access.

Common Vulnerabilities

  1. Logging PII – Logs and error messages may expose sensitive data.
  2. PII in URLs – Query parameters can leak data in logs and browser history.
  3. Insecure Backups – Attackers can extract PII from device backups.

Reducing PII exposure and securing its storage and transmission are key to preventing privacy violations.



Comments

Popular posts from this blog

How to join Cyber Cell or Cyber Crime Department in India || Exam or Direct or Skills???

Some Dark web Links

Mimikatz: The Ultimate Password Extraction Tool in Kali Linux