From bb8296eb57c94809a68c657be88fc8265cff0ef8 Mon Sep 17 00:00:00 2001 From: Elar Lang Date: Tue, 22 Oct 2024 13:33:21 +0300 Subject: [PATCH] #1389 relocate ip requirement --- 5.0/en/0x10-V1-Architecture.md | 1 - 5.0/en/0x18-V10-Coding.md | 1 + 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/5.0/en/0x10-V1-Architecture.md b/5.0/en/0x10-V1-Architecture.md index 987edbdc2e..6857c7800e 100644 --- a/5.0/en/0x10-V1-Architecture.md +++ b/5.0/en/0x10-V1-Architecture.md @@ -152,7 +152,6 @@ This is a placeholder for future documentation requirements. | **1.14.4** | [DELETED, NOT IN SCOPE] | | | | | | **1.14.5** | [DELETED, MOVED TO 10.5.1] | | | | | | **1.14.6** | [MOVED TO 50.7.2] | | | | | -| **1.14.7** | [ADDED] Verify that the application is able to discern and utilizes the user's true IP address to provide for sensitive functions, including rate limiting and logging. | | ✓ | ✓ | 348 | ## References diff --git a/5.0/en/0x18-V10-Coding.md b/5.0/en/0x18-V10-Coding.md index fea6851944..9880bcd471 100644 --- a/5.0/en/0x18-V10-Coding.md +++ b/5.0/en/0x18-V10-Coding.md @@ -56,6 +56,7 @@ Complying with this section is likely to be operational and continuous. | **10.4.3** | [ADDED] Verify that JavaScript code is written in a way that prevents prototype pollution, for example, by using Set() or Map() instead of object literals. | | ✓ | ✓ | | | **10.4.4** | [MODIFIED, MOVED FROM 5.1.2] Verify that the application has countermeasures to protect against mass assignment attacks by limiting allowed fields per controller and action, e.g. it is not possible to insert or update a field value when it was not intended to be part of that action. | ✓ | ✓ | ✓ | 915 | | **10.4.5** | [ADDED] Verify that the application only returns data which the user has permission to access. For example, the API response does not return a full object with attributes that contain values the user has no permission to access, despite having permission to access the data object itself. | ✓ | ✓ | ✓ | | +| **10.4.6** | [ADDED] Verify that the application is able to discern and utilizes the user's true IP address to provide for sensitive functions, including rate limiting and logging. | | ✓ | ✓ | 348 | ## 10.5 Security Architecture