Skip to content

Commit

Permalink
Merge pull request #432 from bugcrowd/on-2FA-activation-change
Browse files Browse the repository at this point in the history
updated rec for Failure to Invalidate session upon 2FA activation or …
  • Loading branch information
RRudder committed May 15, 2024
2 parents c6e5496 + df48a5d commit c086ced
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
# Recommendation(s)

At a minimum, all non-current user sessions should be invalidated when the user sets up or changes their 2FA. However, it is best practice to invalidate all sessions upon 2FA activation or change and have the user login to their account again and prompt for the newly created 2FA mechanism.
All user sessions should be invalidated when the user sets up or changes their 2FA. The application should then have the user login to their account again and prompt for the newly created 2FA mechanism.

Short session expiration should be considered for all user sessions as they allow an attacker less time to use a valid session ID. Session timeout values should be set based upon business needs which take into consideration the criticality of the application and the data contained within.
It is also best practice to shorten session timeout values based upon business needs. The length of the session should take into consideration the criticality of the application and the data contained within.

For further information, please see Open Web Application Security Project (OWASP):

Expand Down

0 comments on commit c086ced

Please sign in to comment.