Slide 21
Slide 21 text
Responding to a Leak or Attack
● You should have a plan in place, so that attacks are handled swiftly
● If a token is compromised, revoke it immediately
○ You should have an easy way to revoke tokens, don’t edit your database by hand!
● If a user reports suspicious activity on their account, reset the account
○ Revoke all active tokens for the user
○ Ensure that user information hasn’t been altered as part of the attack
○ Force the user to reset their password on the next login
● If you think your server was compromised, use the “nuclear option”
○ Revoke your current SSL certificate and request a new one
○ Force all users to set a new password on their next login
○ Change your token signing key (this will effectively revoke all active tokens for all users)
● Make sure you have automated tests in place for all the above measures!