R072. Set maximum response time

Requirement

The response time with the maximum expected concurrence must be no more than 5 seconds.

Description

Response time is a relevant measure of a system’s availability and adaptability to stress. It is also important when it comes to usability and reliance. For these reasons the response time must not surpass 5 seconds when the number of concurrent users reaches its peak.

References

  1. CWE-400: Uncontrolled Resource Consumption. The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

  2. CWE-770: Allocation of Resources Without Limits or Throttling. The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

  3. GDPR. Art. 32: Security of processing.(1)(c). The controller and the processor shall implement appropriate technical and organizational measures to ensure an appropriate level of security, including the the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.

  4. OWASP-ASVS v4.0.1 V11.1 Business Logic Security Requirements.(11.1.4) Verify the application has sufficient anti-automation controls to detect and protect against data exfiltration, excessive business logic requests, excessive file uploads or denial of service attacks.

  5. OWASP-ASVS v4.0.1 V13.4 GraphQL and other Web Service Data Layer Security Requirements.(13.4.1) Verify that query whitelisting or a combination of depth limiting and amount limiting should be used to prevent GraphQL or data layer expression denial of service (DoS) as a result of expensive, nested queries. For more advanced scenarios, query cost analysis should be used.

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy